This seminar report discusses fingerprint sensors and their applications. It provides background on fingerprint identification and classification, then describes the main types of fingerprint sensors including capacitive, optical, thermal, pressure, radio frequency, and ultrasonic. It explains how fingerprint sensors work to capture and analyze fingerprint images. The report also outlines key applications of fingerprint sensors such as border control, driver's licenses, device unlocking, and biometric door locks. Finally, it discusses future applications involving linking fingerprint authentication to government identification cards and ATM security.
One of the most helpful presentation for academic and non academic purpose. This presentation can be presented for 40-45 mins. It contains both technical and non technical details of working of a fingerprint bio-metric scanner.
One of the most helpful presentation for academic and non academic purpose. This presentation can be presented for 40-45 mins. It contains both technical and non technical details of working of a fingerprint bio-metric scanner.
Biometric ATM are used for wide range of applications like for Banking, Coupons & Self service ATM. Biometrics ATM offer ATM type interface along with at-least one Biometrics capture device like Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face recognition camera. They are often called Multi-Biometrics ATM, Wall mount Biometrics ATM, Biometrics Devices / Machine.
Most of the ATM in the past have been using ID cards to identify users but with the wide acceptance of Biometrics , a new generation of Biometrics ATM are being deployed for wide range of applications worldwide.
Technology that identifies you based on your physical or behavioral traits- for added security to confirm that you are who you claim to be.(this ppt is very dear to me as i have given a talk on this topic twice. this also fetched me and migmar first prize at deen dayal upadhyay college- converging vectors - an inter college presentation competition organized by arya bhata science forum)
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
In this modern era, a huge revolution in technology is the introduction of biometric recognition system. One of the most useful biometric recognition system is fingerprint recognition system. The fingerprint recognition system is considered to most important biometric system in addition to other biometrics recognition systems
Secured Employee Attendance Management System Using FingerprintIOSR Journals
In this paper an effective employee attendance management system using fingerprint is introduced.
It is used to managed the attendance of employees in any organization. All organizations and institutions are
established to achieve specific objectives or goals. The identification and authentication of employee is very
necessary for achieving any objective or goal. To identify and authenticate the identity of an individual
employee by their names, ID numbers and signatures only are not enough, because any one can misuse other's
identity and this type of problem occur very often. Fingerprint can be applied for recognizing any person,
because human fingerprints are unique to each person and can be regarded as some sort of signature, certifying
the person's identity. This method of employee identification and authentication will improve the attendance of
employees thereby improving security, productivity and skill which will in turn improve the progress of
organizations.
Biometric ATM are used for wide range of applications like for Banking, Coupons & Self service ATM. Biometrics ATM offer ATM type interface along with at-least one Biometrics capture device like Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face recognition camera. They are often called Multi-Biometrics ATM, Wall mount Biometrics ATM, Biometrics Devices / Machine.
Most of the ATM in the past have been using ID cards to identify users but with the wide acceptance of Biometrics , a new generation of Biometrics ATM are being deployed for wide range of applications worldwide.
Technology that identifies you based on your physical or behavioral traits- for added security to confirm that you are who you claim to be.(this ppt is very dear to me as i have given a talk on this topic twice. this also fetched me and migmar first prize at deen dayal upadhyay college- converging vectors - an inter college presentation competition organized by arya bhata science forum)
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
In this modern era, a huge revolution in technology is the introduction of biometric recognition system. One of the most useful biometric recognition system is fingerprint recognition system. The fingerprint recognition system is considered to most important biometric system in addition to other biometrics recognition systems
Secured Employee Attendance Management System Using FingerprintIOSR Journals
In this paper an effective employee attendance management system using fingerprint is introduced.
It is used to managed the attendance of employees in any organization. All organizations and institutions are
established to achieve specific objectives or goals. The identification and authentication of employee is very
necessary for achieving any objective or goal. To identify and authenticate the identity of an individual
employee by their names, ID numbers and signatures only are not enough, because any one can misuse other's
identity and this type of problem occur very often. Fingerprint can be applied for recognizing any person,
because human fingerprints are unique to each person and can be regarded as some sort of signature, certifying
the person's identity. This method of employee identification and authentication will improve the attendance of
employees thereby improving security, productivity and skill which will in turn improve the progress of
organizations.
[Biometric Systems][The world has been waiting] [Th.docxdanielfoster65629
[Biometric Systems]
[The world has been waiting]
[The latest and greatest technology is being brought out before our very eyes in
this new millennium and we have the chance to not only see it but use it in our
very live. This research paper will review what is going on in biometric security
technology]
2007
Miguel Echeverria
Environments of Information Systems
11/14/2007
[Biometric Systems] Miguel Echeverria
2 | P a g e
Table of Contents
INTRODUCTION ...................................................................................... 3
HISTORY OF BIOMETRICS ...................................................................... 3
BIOMETRICS ............................................................................................ 4
Fingerprint identification ............................................................... 4
Hand geometry ............................................................................. 4
Eye scanning .................................................................................. 5
Voice verification .......................................................................... 5
Keystroke dynamics ...................................................................... 6
Signature recognition ................................................................... 6
Vein recognition ............................................................................ 7
Face recognition ........................................................................... 8
LEADERS OF INDUSTRY .......................................................................... 8
Schlage Products .......................................................................... 9
Ingersoll Rand Brands .................................................................... 9
Kwikset Products ............................................................................ 9
PROGRAMMING LOCKS .................................................................... 10
Software ....................................................................................... 10
Programming with PDA’S .......................................................... 10
Card Programmed ..................................................................... 10
Keypad Programmed ................................................................ 11
Wireless Access ........................................................................... 11
VIP Online Locks .......................................................................... 11
ADVANTAGES OF BIOMETRIC LOCK SYSTEMS ................................ 12
DISADVANTAGES BIOMETRIC TECHNOLOGY ................................. 12
WHAT THE FUTURE HOLDS ................................................................... 13
SUMMARY AND CONCLUSION ......................................................... 14
REFERENCES ............................................
Applications of Biometrics in Technologyiamsanjayk
Biometric in the field of Computer science ! This is a powerpoint presentation prepared as a first year participation in college presentation competition. Topic - Applications of biometrics in technology. This was my first attempt. Hope it comes in use for people in need of a simple presentation.
This is a Fingerprint based class attendance system in higher institutions, The implementation take attendance of student in a class and give output of student eligibility status at the end of the semester or term
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...ijtsrd
Sign Language SL is a medium of communication for physically disabled people. It is a gesture based language for communication of dumb and deaf people. These people communicate by using different actions of hands, where each different action means something. Sign language is the only way of conversation for deaf and dumb people. It is very difficult to understand this language for the common people. Hence sign language recognition has become an important task. There is a necessity for a translator to communicate with the world. Real time translator for sign language provides a medium to communicate with others. Previous methods employs sensor gloves, hat mounted cameras, armband etc. which has wearing difficulties and have noisy behaviour. To alleviate this problem, a real time gesture recognition system using Deep Learning DL is proposed. It enables to achieve improvements on the gesture recognition performance. Jeni Moni | Anju J Prakash ""A Deep Neural Framework for Continuous Sign Language Recognition by Iterative Training: Survey"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30032.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/30032/a-deep-neural-framework-for-continuous-sign-language-recognition-by-iterative-training-survey/jeni-moni
HW 11. List the main modules of a biometric system.A) Sensor MNarcisaBrandenburg70
HW 1
1. List the main modules of a biometric system.
A) Sensor Module
B) Feature Module
C) System Database Module
D) Matcher Module
E) Decision Module
2. What is verification? What is Identification? What is the difference between verification and identification?
Verification is the process in which a user, provides information to the biometric system claiming to be a specific member. This is done through use of a username and a form of biometric data. The system next processes the given information and runs it against the database to determine a match. Identification is a process in which the user provides biometric data and allows the system to determine if it recognizes you and if you are indeed a member. Verification differs from identification because verification is the user telling the system who they are while identification requires the system to recognize the user on its own.
3. Briefly describe Wayman’s Taxonomy of biometric applications.
Based off the requirements and operational environment of an Identity Management system, Wayman’s Taxonomy provides a multi-dimensional classification system consisting of:
a) Over or covert: The users’ awareness and approval of the use of their personal biometric data.
b) Cooperative or noncooperative: The behavior of the user and whether they want the system to recognize them or not.
c) Habituated or nonhabituated: How often a individual uses the biometric system and the level or training required for proper use.
d) Supervized or nonsupervised: Whether the biometric system requires an operator or supervisor to determine proper use my user.
e) Standardized or nonstandarized environment: maintain the same background for consistent positive outcomes with biometric systems.
f) Closed or open systems: Does the system require shared data from another system.
g) Public or private: determined by relationship between the user and the system owner.
HW 3-1
1. What evidence exists that fingerprints were understood to be unique to the individual in anciet times?
Early humans dating back to 7000 B.C. had an understanding that Fingerprints were Unique. We have archeological evidence that proves that Thumb prints were the earliest form of signatures, in places like Jericho in 7000 B.C., and Babylon 1900 B.C.
2. What are Galton details?
Galton’s details refer to Sir Francis Galton’s observations and classifications of fingerprints. Galton discovered that fingerprints were unique and remained unchanged through the course of a person’s life, which are a combination of arches, loops and whorls. Galton also devised a new method for taking prints and pointed out further ridge characteristics.
3. Explain why there was a reluctance to accept fingerprints as an absolute method of identification in the early years?
The reluctancy to accept fingerprints I the early years was since it was still not a specifically focused science in the idea that fingerprints would be a sole form of identification. Early scientists, dati ...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
The idea of security is as old as humanity itself. Between oldest methods of security were
included simple mechanical locks whose authentication element was the key. At first, a universal–simple
type, later unique for each lock. A long time had mechanical locks been the sole option for protection
against unauthorized access. The boom of biometrics has come in the 20th century, and especially in
recent years, biometrics is much expanded in the various areas of our life. Opposite of traditional security
methods such as passwords, access cards, and hardware keys, it offers many benefits. The main benefits
are the uniqueness and the impossibility of their loss. The main benefits are the uniqueness and the
impossibility of their loss. Therefore we focussed in this paper on the the design of low cost biometric
fingerprint system and subsequent implementation of this system in praxtise. Our main goal was to create
a system that is capable of recognizing fingerprints from a user and then processing them. The main part
of this system is the microcontroller Arduino Yun with an external interface to the scan of the fingerprint
with a name Adafruit R305 (special reader). This microcontroller communicates with the external database,
which ensures the exchange of data between Arduino Yun and user application. This application was
created for (currently) most widespread mobile operating system-Android.
Similar to Report on Finger print sensor and its application (20)
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
1. Seminar Report on:
FINGER PRINT SENSOR AND
ITS APPLICATIONS
Presented by:
ARNAB PODDER (Roll No. - 07)
ATUL RAJ (Roll No. - 08)
Under the supervision of –
Prof. Jayjeet Sarkar
2017
Department of Electronics and Instrumentation Engineering
Academy of Technology
Adisaptagram, Hooghly, West Bengal,
712121
2. INDEX
Contents Page No.
1. Introduction…………………………….………………..1
2. History………………………………….………………..2
3. Working……………………...………….……………….3
4. Block Diagram……………...………….………………..3
5. About Finger Prints…………………….……………….4
6. Types of Finger Prints………………….………………5
7. Types of Finger Print Sensor………….…………….6-9
8. Application of Finger Print Sensor……...……………10
9. Future Scope of Finger Print Sensor…..…………….11
10. Advantages……………………………………………..12
11. Disadvantages……………………………………...…..13
12. Conclusion………………………………………………14
13. Bibliography……………………………..………………15
3. Certificate
This is to certify that the work presented in this Seminar Report has
been prepared by –
ARNAB PODDER (Roll No. - 07) and ATUL RAJ (Roll No. -08) u under the
supervision of Prof. Jayjeet Sarkar, being Sixth Semester B.Tech,
Electronics and Instrumentation Engineering student of Academy of
Technology, Adisaptagram.
…………………… ………………………
Prof. Jayjeet Sarkar Prof. Hiranmoy Mandal
(MENTOR) (HEAD OF DEPARTMENT)
Examined by-
…………………………….. ………………………………
…………………………….. ………………………………
(I)
4. STATEMENT BY THE CANDIDATE
We hereby state that this technical report has been prepared
by us is a record of our presentation on this topic. The report is
being submitted to fulfil the requirements of Course EI681 of the
curriculum of Academy of Technology, Hooghly, India, 712121.
……………………… ………………………
ARNAB PODDER ATUL RAJ
Roll No. - 07 Roll No. - 08
6th
Semester 6th
Semester
(EIE) (EIE)
(II)
5. AKNOWLEDGEMENT
It is our privilege to express our sincerest regards to our project coordinator,
Prof. Basab Chatterjee, and mentor Prof. Jayjeet Sarkar, for their valuable inputs,
able guidance, encouragement, whole-hearted cooperation and constructive
criticism throughout the duration of our project. We deeply express our sincere
thanks to our Head of Department Prof. Hiranmoy Mandal for encouraging and
allowing us to present the project on the topic “FINGER PRINT SENSOR AND
ITS APPLICATION” at our department premises for the partial fulfilment of the
requirements leading to the award of B.Tech degree. We take this opportunity to
thank all our lecturers who have directly or indirectly helped in our project. Last
but not the least we express our thanks to our friends for their cooperation and
support.
(III)
6. ABSTRACT
Fingerprint recognition is very popular in biometric system as fingerprint remains
unchanged throughout the life of a person. Fingerprints are unique in nature and
fingerprints of one person are different from another person’s fingerprints. It can be
used in access control mechanism and for attendance system. Fingerprint images
can be captured by different methods but image taken by an optical scanner are of
the highest quality and reliable too. Notes about the ridges, loops, and spirals of
fingerprints were first made in 1686 by Marcello Malpighi. However, it was not until
1880 that fingerprints were recognized as a means of personal identification by Henry
Faulds, who also identified a first ever fingerprint. The first book about fingerprints
was published in 1888 by Sir Francis Galton, and was titled simply Fingerprints.
Galton established the first classification system for fingerprints and was the first to
assert that no two prints are the same, or that the odds of two prints being identical
were about 1 in 64 billion. Later, the Henry Classification System was developed in
1901 by Sir Edward Henry, and today forms the basis for print recognition in most
English speaking countries. This system categorized the ridge patterns into three
groups: loops, whorls, and arches. Fingerprinting was soon introduced in prisons,
army and widely used for identification by law enforcement. The Federal Bureau of
Investigation collection has millions of fingerprint cards and consists of approximately
70 million fingerprints. Although the main use of prints remains in forensic science
and law enforcement, new uses of fingerprints have been developed.
(IV)
7. Introduction:
Fingerprints are the patterns on the inside and the tips of fingers. The ridges of
skin, also known as friction ridges, together with the valleys between them form
unique patterns on the fingers. Fingerprint analysis is a biometric technique
comparing scanned image of prints with a database of fingerprints. Uniqueness of
prints, and the fact that they do not change during a person's life, form the basis for
fingerprint analysis. The uniqueness of the prints is determined by the minute changes
in local environment during fatal development; therefore, the identical twins
undistinguishable by DNA analysis can be differentiated with fingerprint analysis.
Although the fingerprint pattern remains the same, growth accounts for an
enlargement of the patterns. Additionally, accidents or some diseases may alter
fingerprint patterns
Detection of fingerprints. Presence of pores on the surface of the ridges of the
fingers results in the accumulation of perspiration on the fingertips. This moisture
remains on the surface of the object a person touches, leaving prints. Depending on
the surface touched, prints can be visible to the naked eye (e.g. metal, glass or plastic)
or invisible (paper, cardboard or timber). Prints left on non-porous surfaces such as
metal can be visualized with powders and lifted with tape. In contrast, the prints on
porous objects require special lighting, such as lasers or x rays. There are two major
methods of the identification of fingerprints—comparison of lifted prints and live
scanning. The first method is mainly used in forensics, while the second is used
for authentication purposes (in security applications) and is also slowly becoming a
method for identification at some police stations. A fingerprint is seen on the back of
a wireless device called an "IBIS." It can record a fingerprint in the field, then send the
fingerprint via a wireless connection to be checked against a database.
7 | P a g e
8. HISTORY
Early use-
The history of fingerprinting began long before its use in criminal proceedings.
According to historians, Babylonians would press their fingers into wet clay to record
business transactions. The Chinese adapted this system, but held onto its benefit as
a unique identifier, using ink on paper to conduct business transactions. Even
hundreds of years later, the practice was still in use when, in 1858, an
Englishman named Sir William Herschel, then Chief Magistrate of the
Hooghly district in Jungipoor, India, required residents to record their
fingerprints when signing business documents.
Modern Use-
It wasn’t until 1896 when the modern system of fingerprint
identification came to be. Sir Edward Henry, commissioner of the
Metropolitan Police of London, created his own classification system
using the pioneering work of Galton. His system used the now-familiar
whorls, loops, and arches of frictional ridges on the fingertip to identify
individuals. His system, the Henry Classification System, replaced the
Bertillon age system and modern fingerprinting began. So successful
was the technique that Scotland Yard established its own Fingerprint
Bureau in 1901, presenting fingerprint evidence in court for the first time
in 1902. In 1903, the system spread to New York state prisons, further
cementing its usage as an investigatory tool. Unfortunately, the system
was cumbersome. Records had to be compared manually, requiring
hours or days to yield a match, if it was even successful. The Japanese
National Police Agency answered this problem with the advent of
computers in the 1980s. Their system, called the Automated Fingerprint
Identification System (AFIS) allowed for cross-check of millions of prints
simultaneously. Testament to Galton and Henry’s legacy, the digital
utilizes the same identifying characteristics of their late -19th century
system when determining a match. Prior to 1999 FBI’s Criminal Justice
Information Services Division introduced the Integrated AFIS, which
allows for categorization, search, and retrieval of fingerprints from
anywhere in the U.S. in as little as 30 minutes. In addition, the system
displays mug shots and criminal histories for persons in the system.
Approximately 70 million records are in the IAFIS, including 34 million
civil prints. This same system used for employment checks, issuance of
license, and enrolment in social services programs, making it one of the
most used and most valuable tools in the world. And now it can be found
on most of the smart phones.
2 | P a g e
9. WORKING:
A fingerprint sensor is an electronic device used to capture a digital image of
the fingerprint pattern. The captured image is called a live scan. This live scan
is digitally processed to create a biometric template (a collection of extracted features)
which is stored and used for matching. Many technologies have been used including
optical, capacitive, RF, thermal, piezo-resistive, ultrasonic, piezoelectric. This is an
overview of some of the more commonly used fingerprint sensor technologies.
There are mainly two types of scanning methods for this technology. Either an optical
or capacitance scanner is used to scan and make a picture of your finger. Though
both the methods produce the same type of image, the making of it is completely
different.
This scanned image is then compared with an earlier existing finger print of yours to
get the correct identity. The comparison is carried out by the processor and the
comparison is made between the valleys and ridges. Though the steps are simple,
very complex algorithms must be carried out to perform this operation. Though your
whole fingerprint is recorded, the computer takes only parts of the print to compare
with other records.
BLOCK DIAGRAM:
3 | P a g e
10. ABOUT FINGER PRINTS:
Before going in detail about the technology used, it is very important to know about
the basics of our fingerprints. The basic information about fingerprint is that it is unique
for each person. Even a twin brother will not have the same fingerprint. Thus each
fingerprint is used to store a unique identifiable piece of information. The uniqueness
in each fingerprint is due to the peculiar genetic code of DNA in each person. This
code causes the formation of a different pattern of our fingerprint.
A fingerprint consists of ridges and valleys. They together provide friction for the skin.
The main identification of the skin is based upon the minutiae, which actually is the
location and direction of the ridge endings and splits along a ridge path. The image
shown below represents two types of minutiae as shown in FIG: 1(a)
FIG: 1(a) FIG: 1(b)
The image above [FIG: 1(b)] shows all the other characteristics of a fingerprint. These
characteristics may also be helpful during the process of minutiae extraction. The
unique information used for the identification includes the flow of the friction ridges,
the sequence and also the presence/absence of the individual friction ridge path
features.
4 | P a g e
11. TYPES OF FINGER PRINT:
Five main classes of fingerprints
o Arch [FIG: 2.1]
o Tented Arch [FIG: 2.2]
o Left Loop [FIG: 2.3]
o Right Loop [FIG: 2.4]
o Whorl [FIG: 2.5]
FIG: 2.1 FIG: 2.2
FIG: 2.3
FIG: 2.4 FIG: 2.5
5 | P a g e
12. TYPES OF FINGER PRINT SENSOR:
Capacitive type finger print Sensors:
Capacitive sensors use an array capacitor plates to image the fingerprint. Skin is
conductive enough to provide a capacitive coupling with an individual capacitive
element on the array. Ridges, being closer to the detector, have a higher capacitance
and valleys have a lower capacitance. Some capacitive sensors apply a small voltage
to the finger to enhance the signal and create better image contrast.
Capacitive sensors can be sensitive to electrostatic discharge (shock) but they are
insensitive to ambient lighting and are more resist contamination issues than some
optical designs.
Fig: Capacitive type finger print sensor
Optical type finger print Sensors:
Optical sensors use arrays of photodiode or phototransistor detectors to convert the
energy in light incident on the detector into electrical charge. The sensor package
usually includes a light-emitting-diode (LED) to illuminate the finger.
There are two detector types used by optical sensors, charge-coupled-devices (CCD)
and CMOS based optical imagers. CCD detectors are sensitive to low light levels and
are capable of making excellent grayscale pictures. However, CCD fabrication is
relatively expensive and neither low-light sensitivity or grayscale imaging are required
for fingerprint recognition. CMOS optical imagers are manufactured in quantity and
can be made with some of the image processing steps built into the chip resulting in
a lower cost.
Optical sensors for fingerprints may be affected by a number of real world factors such
as stray light and surface contamination, possibly even a fingerprint impression left
by a prior user. Common contaminates that deteriorate image quality include oil and
dirt, scratches on the sensor surface, and condensation or ice. Some suppliers have
6 | P a g e
13. tried to sidestep the contamination problem by directly taking a 3D image from the
surface of a finger. 3D imaging technology is more hygienic but introduces a whole
new set of problems and was not included in this study.
Fig: Optical type finger print sensor
Fig: Optical type finger print sensor
Thermal type finger print Sensors:
Thermal sensors use the same pyro-electric material that is used in infrared cameras.
When a finger is presented to the sensor, the fingerprint ridges make contact with the
sensor surface and the contact temperature is measured, the valleys do not make
contact and are not measured. A fingerprint image is created by the skin-temperature
ridges and the ambient temperature measure for valleys. The biggest drawback of
this technique is that the temperature change is dynamic and it only takes about a
tenth of a second for the sensor surface touching ridges and valleys to come to the
same temperature, erasing the fingerprint image. While it can operate over a wide
range of temperatures, if the ambient temperature is close to the finger surface
temperature the sensor requires heating to create a temperature difference.
Fig: Thermal type finger print sensor
7 | P a g e
14. Pressure type finger print Sensors:
Pressure sensing scanners can be made very thin and are often used in electronic
devices. Early pressure sensing scanners had to make a trade-off between durability
and quality because any protective layer on the detector surface would diminish the
contrast of the impression. There are two types of pressure sensing detectors
available, conductive film detectors and micro electro-mechanical devices (MEMS).
Conductive film sensors use a double-layer electrode on flexible films. MEMS is a
newer technology that uses extremely tiny silicon switches on a silicon chip. When a
fingerprint ridge touches a switch, it closes and is detected electronically
Fig: Pressure type finger print sensor
Low radio frequency (RF) type finger print Sensors:
A low radio frequency (RF) signal is applied to the user’s finger and then read by the
detector array, with each pixel operating like a tiny antenna. The advantage of this
detector is that it reads the fingerprint from the dermal layer underneath the surface
making it less susceptible to damaged or dry fingertips. It basically uses signal
generator.
Fig: low radio frequency (RF) type finger print sensor
8 | P a g e
15. Ultrasonic type finger print Sensors:
Ultrasonic scanners have an advantage of being able to see beneath the skin. This
provides not only verification of a live finger, it provides more information as a
biometric measure. But this technology is slow, expensive, bulky, and too data
intensive for most access control applications
Fig: Ultrasonic type finger print sensor
9 | P a g e
16. APPLICATIONS OF FINGER PRINT SENSOR:
Voter registration and identification
Border control via passport verification
Population census by using biometrics
Driver’s license and professional ID card verification
Lock/unlock devices and application software
Secure logins via keyboard modules
User identification at kiosks
Biometric door locks
Credit card security
Weapon activation
Theft protection
Digital payments using ADHAR card verification
10 | P a g e
17. FUTURE SCOPE OF FINGER PRINT SENSOR:
Application those provides solutions, support, feedback and problem conclusion.
These all are required to be uniquely identifying in future fingerprint can be a most
important factor for authentication and authorization. The used of UID to test
fingerprint at different places with different application can make it feasible examine
the originality of person presented.
If the Govt. Election may conduct using UID card, then fake entries can be
avoided.
If the ATM Machine and Card may connect with the UID card system then only
allowed people would transact money Authenticate by Fingerprint Scanner at
ATM.
Other Scheme those can take advantage to Fingerprint Scanned Images by
UID are as follow: Indian Post Office, NREGA
1171 |
P a g e
18. ADVANTAGES:
Others can’t use one’s identity since physical attributes can’t be duplicated like
identity cards.
It is cheap, fast and easy to setup.
You can't misplace your fingerprints and it does not change with age or get
affected by any disease.
It can’t be forgotten since it’s a physical feature.
Very high accuracy.
Easy to use.
DISADVANTAGES:
For some people it is very intrusive, because is still related to criminal
identification.
It can make mistakes with the dryness or dirty of the finger’s skin, as well as
with the age (is not appropriate with children, because the size of their
fingerprint changes quickly).
Image captured at 500 dots per inch (dpi). Resolution: 8 bits per pixel. A 500
dpi fingerprint image at 8 bits per pixel demands a large memory space, 240
Kbytes approximately → Compression required (a factor of 10 approximately)
12 | P a g e
19. CONCLUSION:
The conclusion of the report is, the Fingerprint Sensor Authentication is the key to
solve many problems related to fake entries and security attacks. There seems to
exits some disadvantages over the advantages for using fingerprint sensor, this is one
reason why such systems are yet not widely used. But the advantages mentioned
above are so important and people want to benefit from them that the disadvantages
will be more and more reduced in future. The fingerprint is the only biometric type
which is very easy to take, handle, and operated using recent developments in Image
Processing. The problems regarding image size in database is not a serious problem
due to cloud computing whereas unlimited data can be stored and transfer moreover
many researches are in process.
The important points concluded are as follows:
Fingerprint Images are very easy to recognize compared to other
biometric technology because it has specific pattern to classify.
In case two Fingerprints of different person are matched, then Fingerprints
of other fingers can never be match with other person’s fingerprints. So,
authenticity is very high.
If the matching techniques discussed above may compose into a single
system then the fingerprint verification results will optimized.
13 | P a g e