SlideShare a Scribd company logo
PRESENTATION
A
ON
FINGERPRINT RECOGNITION
SYSTEM
PRESENTED BY : SAGAR
CHAND GUPTA
ROLL NO. :
BRANCH : EC 4RD
OVERVIEW :
1. Introduction
2. What is Biometrics ?
3. History of Fingerprint
4. What is Fingerprint ?
5. Fingerprint Classification
6. What is Fingerprint Recognition ?
7. Fingerprint Recognition System
8. The General Structure of Fingerprint Scanner
9.Devices
10.Fingerprint Sensors
11.Applications
12.Conclusion.
WHAT IS BIOMETRICS?
• Biometrics is the science and technology of measuring and
analysing biological data.
• Biometrics refers to metrics related to human characteristics.
Biometrics authentication (or realistic authentication) is used in
computer science as a form of identification and access control
. It is also used to identify individuals.
• Biometric identifiers are the distinctive, measurable
characteristics used to label and describe individuals.
• The technology used for identification of a user based on a
physical or behavioural characteristic, such as a fingerprint,
iris, face, voice or handwriting is called Biometrics.
• Automated methods of recognizing a person based on a
physiological or behavioural characteristics.
PHYSIOLOGICAL & BEHAVIOURAL CHARACTERISTICS
PHYSIOLOGICAL CHARACTERISTIC
1. Fingerprint
2. Face recognition
3. DNA
4. Palm Print
5. Hand Geometry
6. Iris Recognition
7. Retina and
8. Odour/ Scent
BEHAVIORAL CHARACTERISTIC
1. Typing Rhythm
2. Signature
3. Gait and
4. Voice
HISTORY OF FINGERPRINT :
• Human fingerprints have been discovered on a large number of archaeological
artifacts and historical items.
• In 1684, the English plant morphologist, Nehemiah Grew , published the first
scientific paper reporting his systematic study on the ridge, furrow, and pore
structure
• Johann Christophe Andreas Mayer (1747–1801) was a
German anatomist. In 1788, he was the first person to recognize
that fingerprints were unique to each individual.
• Jan Evangelista Purkyně or Purkinje (1787–1869) proposed the first 9
fingerprint patterns.
• In 1975, The FBI funded the development of fingerprint scanners.
WHAT IS FINGERPRINT ?
Skin on human fingertips contains ridges and valleys
which together forms distinctive patterns.
These patterns are fully developed under pregnancy and
are permanent throughout whole lifetime. Prints of those
patterns are called fingerprints.
Injuries like cuts, burns and bruises can temporarily
damage quality of fingerprints but when fully healed,
patterns will be restored. Through various studies it has
been observed that no two persons have the same
fingerprints, hence they are unique for every individual.
However , shown by intensive research on fingerprint
recognition, fingerprints are not distinguished by
their ridges and furrows, but by features called Minutia
,which are some abnormal points on the ridges .
Among the variety of minutia types reported in literatures,
two are mostly significant and in heavy usage:
Ridge ending - the abrupt end of a ridge.
Ridge bifurcation - a single ridge that divides into
two ridges.
FINGERPRINT FORMATION
FINGERPRINT CLASSIFICATION :
• Classification is necessary to reduce the search time and
computational complexity.
• The FBI database has 70 million fingerprints
•
•
Arch
(T
ented Arch)
Arch
Loop
(Right Loop) Whorl
WHAT IS FINGERPRINT RECOGNITION ?
• Fingerprint recognition (sometimes referred to as
dactyloscopy ) is the process of comparing questioned
and known fingerprint against another fingerprint to
determine if the impressions are from the same finger
or palm.
• In addition, different from the manual approach for
fingerprint recognition by experts, the fingerprint
recognition here is referred as AFRS (Automatic
Fingerprint Recognition System) , which is program
• It includes two sub-domains :
One is fingerprint verification and the other is fingerprint
identification.
Fingerprint verification (one to one matching) :
Fingerprint verification is to verify the authenticity of
one person by his fingerprint.
Fingerprint identification ( one to many matching ):
Fingerprint identification is to specify one person’s
identity by his fingerprints.
Verification vs Identification
FINGERPRINT RECOGNITION SYSTEM
Fingerprint recognition system operates in three stages :
(i) Fingerprint acquiring device
(ii) Minutia extraction and
(iii) Minutia matching
Fingerprint recognition system
1.Fingerprint acquisition:
For fingerprint acquisition, optical or semi-conduct sensors are
widely used. They have high efficiency and acceptable accuracy
except for some cases that the user’s finger is too dirty or dry.
2.Minutia extractor :
To implement a minutia extractor, a three-stage approach is
widely used by Researchers.
 Preprocessing
 Minutia extraction and
 Post processing stage
• For the fingerprint image preprocessing stage:
Image enhancement
Image binarization
Image segmentation
• The job of minutiae extraction closes down to two operations:
Ridge Thinning, Minutiae Marking.
• In post-processing stage, false minutia are removed and
bifurcations is proposed to unify terminations and bifurcations.
3. Minutiae Matching :
• Generally, an automatic fingerprint verification is achieved with
minutia matching (point pattern matching) instead of a pixel-
wise matching or a ridge pattern matching of fingerprint
images.
• The minutia matcher chooses any two minutia as a reference
minutia pair and then match their associated ridges first.
• If the ridges match well, two fingerprint images are aligned and
matching is conducted for all remaining minutia.
THE GENERAL STRUCTURE OF
FINGERPRINT SCANNER :
DEVICES :
Optical fingerprint sensor
FIU-001/500 by SONY
Electro-optical sensor
[DELSY® CMOS sensor module]
Capacitive sensor
[FingerTIP™ by Infineon]
Keyboard [G 81-12000
by Cherry]
ID Mouse by Siemens
FINGERPRINT SENSORS :
 Optical
 Silicon Based Capacitive Sensors
 Ultrasound
 Thermal
 Pyroelectric
 Piezo-electric
ADVANTAGES :
 Very high accuracy.
 Is the most economical biometric PC user authentication
technique.
 It is one of the most developed biometrics
 Easy to use.
Small storage space required for the biometric template,
reducing the size of the database memory required
 It is standardized.
DISADVANTAGES :
For some people it is very intrusive, because is still related to
criminal identification.
It can make mistakes with the dryness or dirty of the finger’s
skin, as well as with the age (is not appropriate with children,
because the size of their fingerprint changes quickly).
Image captured at 500 dots per inch (dpi). Resolution: 8 bits
per pixel. A 500 dpi fingerprint image at 8 bits per pixel
demands a large memory space, 240 Kbytes approximately →
Compression required (a factor of 10 approximately.
APPLICATIONS :
 Banking Security – ATM security , card transaction
 Physical Access Control (e.g. Airport)
 Information System Security
 National ID Systems
 Passport control (INSPASS)
 Prisoner, prison visitors, inmate control
 Voting
 Identification of Criminals
 Identification of missing children
 Secure E-Commerce (Still under research)
CONCLUSION :
• The above implementation was an effort to understand how Fingerprint
Recognition is used as a form of biometric to recognize identities of human
beings.
• It includes all the stages from enhancement to minutiae extraction of
fingerprints.
• There are various standard techniques are used in the intermediate stages of
processing.
• At last minutiae extraction and comparison happens.
THANK YOU.

More Related Content

Similar to sagarppt111111-150929182421-lva1-app6891.pptx

Seminar
SeminarSeminar
Seminar
Nidhi Nayan
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
Kalyanam Kiran
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
aminpathan11
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
International Journal of Engineering Inventions www.ijeijournal.com
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
sakshi_20
 
Fingerprint Authentication Seminar.pptx
Fingerprint Authentication  Seminar.pptxFingerprint Authentication  Seminar.pptx
Fingerprint Authentication Seminar.pptx
sahoosabyasachi000
 
Farheen123
Farheen123Farheen123
Farheen123
farheentaj9
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
Dharmendrasingh417
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
Vishak Illath veed
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
Rupinder Saini
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
Joy Dutta
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
Abhishek Walia
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
Kumar Goud
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
Pavan Kumar MT
 
Biometrics
BiometricsBiometrics
Biometrics
umertariq12345
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
Abhishek Kumar
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
Karam Munir Butt
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
varsha mohite
 

Similar to sagarppt111111-150929182421-lva1-app6891.pptx (20)

Seminar
SeminarSeminar
Seminar
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Fingerprint Authentication Seminar.pptx
Fingerprint Authentication  Seminar.pptxFingerprint Authentication  Seminar.pptx
Fingerprint Authentication Seminar.pptx
 
Farheen123
Farheen123Farheen123
Farheen123
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 

More from CoreGaming3

shanu.pptx
shanu.pptxshanu.pptx
shanu.pptx
CoreGaming3
 
biometric recognition final (1).pptx
biometric recognition final (1).pptxbiometric recognition final (1).pptx
biometric recognition final (1).pptx
CoreGaming3
 
ppt on Web tools 2.0 Ict work by asmita vyas.pptx
ppt on Web tools 2.0 Ict work by asmita vyas.pptxppt on Web tools 2.0 Ict work by asmita vyas.pptx
ppt on Web tools 2.0 Ict work by asmita vyas.pptx
CoreGaming3
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
CoreGaming3
 
iphonefinal-110520164346-phpapp01 (1).pptx
iphonefinal-110520164346-phpapp01 (1).pptxiphonefinal-110520164346-phpapp01 (1).pptx
iphonefinal-110520164346-phpapp01 (1).pptx
CoreGaming3
 
PPT on BYJUS by Jiya Vaswani.pptx
PPT on BYJUS by Jiya Vaswani.pptxPPT on BYJUS by Jiya Vaswani.pptx
PPT on BYJUS by Jiya Vaswani.pptx
CoreGaming3
 
evolution of iphone by hardik bhandari.pptx
evolution of iphone by hardik bhandari.pptxevolution of iphone by hardik bhandari.pptx
evolution of iphone by hardik bhandari.pptx
CoreGaming3
 
iphone-evolution2-140906164528-phpapp01.pptx
iphone-evolution2-140906164528-phpapp01.pptxiphone-evolution2-140906164528-phpapp01.pptx
iphone-evolution2-140906164528-phpapp01.pptx
CoreGaming3
 
cyber physical by Koyal sharma.pptx
cyber physical by Koyal sharma.pptxcyber physical by Koyal sharma.pptx
cyber physical by Koyal sharma.pptx
CoreGaming3
 
iphonefinal-110520164346-phpapp01.pptx
iphonefinal-110520164346-phpapp01.pptxiphonefinal-110520164346-phpapp01.pptx
iphonefinal-110520164346-phpapp01.pptx
CoreGaming3
 
1606-812-Exercise is Medicine-Food is Fuel.ppt
1606-812-Exercise is Medicine-Food is Fuel.ppt1606-812-Exercise is Medicine-Food is Fuel.ppt
1606-812-Exercise is Medicine-Food is Fuel.ppt
CoreGaming3
 
4.9 --Digital Marketing.ppt
4.9 --Digital Marketing.ppt4.9 --Digital Marketing.ppt
4.9 --Digital Marketing.ppt
CoreGaming3
 
pm.pptx
pm.pptxpm.pptx
pm.pptx
CoreGaming3
 

More from CoreGaming3 (13)

shanu.pptx
shanu.pptxshanu.pptx
shanu.pptx
 
biometric recognition final (1).pptx
biometric recognition final (1).pptxbiometric recognition final (1).pptx
biometric recognition final (1).pptx
 
ppt on Web tools 2.0 Ict work by asmita vyas.pptx
ppt on Web tools 2.0 Ict work by asmita vyas.pptxppt on Web tools 2.0 Ict work by asmita vyas.pptx
ppt on Web tools 2.0 Ict work by asmita vyas.pptx
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
iphonefinal-110520164346-phpapp01 (1).pptx
iphonefinal-110520164346-phpapp01 (1).pptxiphonefinal-110520164346-phpapp01 (1).pptx
iphonefinal-110520164346-phpapp01 (1).pptx
 
PPT on BYJUS by Jiya Vaswani.pptx
PPT on BYJUS by Jiya Vaswani.pptxPPT on BYJUS by Jiya Vaswani.pptx
PPT on BYJUS by Jiya Vaswani.pptx
 
evolution of iphone by hardik bhandari.pptx
evolution of iphone by hardik bhandari.pptxevolution of iphone by hardik bhandari.pptx
evolution of iphone by hardik bhandari.pptx
 
iphone-evolution2-140906164528-phpapp01.pptx
iphone-evolution2-140906164528-phpapp01.pptxiphone-evolution2-140906164528-phpapp01.pptx
iphone-evolution2-140906164528-phpapp01.pptx
 
cyber physical by Koyal sharma.pptx
cyber physical by Koyal sharma.pptxcyber physical by Koyal sharma.pptx
cyber physical by Koyal sharma.pptx
 
iphonefinal-110520164346-phpapp01.pptx
iphonefinal-110520164346-phpapp01.pptxiphonefinal-110520164346-phpapp01.pptx
iphonefinal-110520164346-phpapp01.pptx
 
1606-812-Exercise is Medicine-Food is Fuel.ppt
1606-812-Exercise is Medicine-Food is Fuel.ppt1606-812-Exercise is Medicine-Food is Fuel.ppt
1606-812-Exercise is Medicine-Food is Fuel.ppt
 
4.9 --Digital Marketing.ppt
4.9 --Digital Marketing.ppt4.9 --Digital Marketing.ppt
4.9 --Digital Marketing.ppt
 
pm.pptx
pm.pptxpm.pptx
pm.pptx
 

Recently uploaded

gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtycccccccccccccccccccccccccccccccccccccccccccccccccccccccgtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
4thzenzstar
 
What Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It WorkWhat Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It Work
Motor Cars International
 
Ec330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdfEc330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdf
Excavator
 
Why Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release CommandsWhy Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release Commands
Dart Auto
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
psavhef
 
What Does the Active Steering Malfunction Warning Mean for Your BMW
What Does the Active Steering Malfunction Warning Mean for Your BMWWhat Does the Active Steering Malfunction Warning Mean for Your BMW
What Does the Active Steering Malfunction Warning Mean for Your BMW
Tanner Motors
 
Ec460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdfEc460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdf
Excavator
 
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Hyundai Motor Group
 
Antique Plastic Traders Company Profile
Antique Plastic Traders Company ProfileAntique Plastic Traders Company Profile
Antique Plastic Traders Company Profile
Antique Plastic Traders
 
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptxStatistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
coc7987515756
 
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
amvovau
 
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
Bertini's German Motors
 
Tyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEATTyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEAT
kshamashah95
 
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to TellWondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Vic Auto Collision & Repair
 
Things to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your carThings to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your car
jennifermiller8137
 
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out HereWhy Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Masters European & Gapanese Auto Repair
 
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
European Service Center
 
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
Autohaus Service and Sales
 
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs  Consulting SMEs.pptxEmpowering Limpopo Entrepreneurs  Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Precious Mvulane CA (SA),RA
 

Recently uploaded (19)

gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtycccccccccccccccccccccccccccccccccccccccccccccccccccccccgtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
 
What Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It WorkWhat Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It Work
 
Ec330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdfEc330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdf
 
Why Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release CommandsWhy Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release Commands
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
What Does the Active Steering Malfunction Warning Mean for Your BMW
What Does the Active Steering Malfunction Warning Mean for Your BMWWhat Does the Active Steering Malfunction Warning Mean for Your BMW
What Does the Active Steering Malfunction Warning Mean for Your BMW
 
Ec460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdfEc460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdf
 
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
 
Antique Plastic Traders Company Profile
Antique Plastic Traders Company ProfileAntique Plastic Traders Company Profile
Antique Plastic Traders Company Profile
 
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptxStatistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
 
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
 
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
 
Tyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEATTyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEAT
 
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to TellWondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
 
Things to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your carThings to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your car
 
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out HereWhy Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
 
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
 
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
 
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs  Consulting SMEs.pptxEmpowering Limpopo Entrepreneurs  Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
 

sagarppt111111-150929182421-lva1-app6891.pptx

  • 1. PRESENTATION A ON FINGERPRINT RECOGNITION SYSTEM PRESENTED BY : SAGAR CHAND GUPTA ROLL NO. : BRANCH : EC 4RD
  • 2. OVERVIEW : 1. Introduction 2. What is Biometrics ? 3. History of Fingerprint 4. What is Fingerprint ? 5. Fingerprint Classification 6. What is Fingerprint Recognition ? 7. Fingerprint Recognition System 8. The General Structure of Fingerprint Scanner 9.Devices 10.Fingerprint Sensors 11.Applications 12.Conclusion.
  • 3. WHAT IS BIOMETRICS? • Biometrics is the science and technology of measuring and analysing biological data. • Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control . It is also used to identify individuals. • Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. • The technology used for identification of a user based on a physical or behavioural characteristic, such as a fingerprint, iris, face, voice or handwriting is called Biometrics. • Automated methods of recognizing a person based on a physiological or behavioural characteristics.
  • 4. PHYSIOLOGICAL & BEHAVIOURAL CHARACTERISTICS PHYSIOLOGICAL CHARACTERISTIC 1. Fingerprint 2. Face recognition 3. DNA 4. Palm Print 5. Hand Geometry 6. Iris Recognition 7. Retina and 8. Odour/ Scent BEHAVIORAL CHARACTERISTIC 1. Typing Rhythm 2. Signature 3. Gait and 4. Voice
  • 5. HISTORY OF FINGERPRINT : • Human fingerprints have been discovered on a large number of archaeological artifacts and historical items. • In 1684, the English plant morphologist, Nehemiah Grew , published the first scientific paper reporting his systematic study on the ridge, furrow, and pore structure • Johann Christophe Andreas Mayer (1747–1801) was a German anatomist. In 1788, he was the first person to recognize that fingerprints were unique to each individual. • Jan Evangelista Purkyně or Purkinje (1787–1869) proposed the first 9 fingerprint patterns. • In 1975, The FBI funded the development of fingerprint scanners.
  • 6. WHAT IS FINGERPRINT ? Skin on human fingertips contains ridges and valleys which together forms distinctive patterns. These patterns are fully developed under pregnancy and are permanent throughout whole lifetime. Prints of those patterns are called fingerprints. Injuries like cuts, burns and bruises can temporarily damage quality of fingerprints but when fully healed, patterns will be restored. Through various studies it has been observed that no two persons have the same fingerprints, hence they are unique for every individual.
  • 7. However , shown by intensive research on fingerprint recognition, fingerprints are not distinguished by their ridges and furrows, but by features called Minutia ,which are some abnormal points on the ridges . Among the variety of minutia types reported in literatures, two are mostly significant and in heavy usage: Ridge ending - the abrupt end of a ridge. Ridge bifurcation - a single ridge that divides into two ridges.
  • 9. FINGERPRINT CLASSIFICATION : • Classification is necessary to reduce the search time and computational complexity. • The FBI database has 70 million fingerprints • • Arch (T ented Arch) Arch Loop (Right Loop) Whorl
  • 10. WHAT IS FINGERPRINT RECOGNITION ? • Fingerprint recognition (sometimes referred to as dactyloscopy ) is the process of comparing questioned and known fingerprint against another fingerprint to determine if the impressions are from the same finger or palm. • In addition, different from the manual approach for fingerprint recognition by experts, the fingerprint recognition here is referred as AFRS (Automatic Fingerprint Recognition System) , which is program
  • 11. • It includes two sub-domains : One is fingerprint verification and the other is fingerprint identification. Fingerprint verification (one to one matching) : Fingerprint verification is to verify the authenticity of one person by his fingerprint. Fingerprint identification ( one to many matching ): Fingerprint identification is to specify one person’s identity by his fingerprints.
  • 13. FINGERPRINT RECOGNITION SYSTEM Fingerprint recognition system operates in three stages : (i) Fingerprint acquiring device (ii) Minutia extraction and (iii) Minutia matching Fingerprint recognition system
  • 14. 1.Fingerprint acquisition: For fingerprint acquisition, optical or semi-conduct sensors are widely used. They have high efficiency and acceptable accuracy except for some cases that the user’s finger is too dirty or dry. 2.Minutia extractor : To implement a minutia extractor, a three-stage approach is widely used by Researchers.  Preprocessing  Minutia extraction and  Post processing stage
  • 15. • For the fingerprint image preprocessing stage: Image enhancement Image binarization Image segmentation • The job of minutiae extraction closes down to two operations: Ridge Thinning, Minutiae Marking. • In post-processing stage, false minutia are removed and bifurcations is proposed to unify terminations and bifurcations.
  • 16. 3. Minutiae Matching : • Generally, an automatic fingerprint verification is achieved with minutia matching (point pattern matching) instead of a pixel- wise matching or a ridge pattern matching of fingerprint images. • The minutia matcher chooses any two minutia as a reference minutia pair and then match their associated ridges first. • If the ridges match well, two fingerprint images are aligned and matching is conducted for all remaining minutia.
  • 17.
  • 18.
  • 19. THE GENERAL STRUCTURE OF FINGERPRINT SCANNER :
  • 20. DEVICES : Optical fingerprint sensor FIU-001/500 by SONY Electro-optical sensor [DELSY® CMOS sensor module] Capacitive sensor [FingerTIP™ by Infineon] Keyboard [G 81-12000 by Cherry] ID Mouse by Siemens
  • 21. FINGERPRINT SENSORS :  Optical  Silicon Based Capacitive Sensors  Ultrasound  Thermal  Pyroelectric  Piezo-electric
  • 22.
  • 23. ADVANTAGES :  Very high accuracy.  Is the most economical biometric PC user authentication technique.  It is one of the most developed biometrics  Easy to use. Small storage space required for the biometric template, reducing the size of the database memory required  It is standardized.
  • 24. DISADVANTAGES : For some people it is very intrusive, because is still related to criminal identification. It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly). Image captured at 500 dots per inch (dpi). Resolution: 8 bits per pixel. A 500 dpi fingerprint image at 8 bits per pixel demands a large memory space, 240 Kbytes approximately → Compression required (a factor of 10 approximately.
  • 25. APPLICATIONS :  Banking Security – ATM security , card transaction  Physical Access Control (e.g. Airport)  Information System Security  National ID Systems  Passport control (INSPASS)  Prisoner, prison visitors, inmate control  Voting  Identification of Criminals  Identification of missing children  Secure E-Commerce (Still under research)
  • 26. CONCLUSION : • The above implementation was an effort to understand how Fingerprint Recognition is used as a form of biometric to recognize identities of human beings. • It includes all the stages from enhancement to minutiae extraction of fingerprints. • There are various standard techniques are used in the intermediate stages of processing. • At last minutiae extraction and comparison happens.
  • 27.