SlideShare a Scribd company logo
How Fingerprint Scanners Work

   Computerized fingerprint scanners have been
      mainstay of spy thrillers for decades, until
 recently, they were very exotic technology in the
real world. In recent years, the scanner has begun
     in many places. Instead of the computer is
 protected by a high-tech biometrics, in addition to
   a password to gain access you need a unique
   print. The fingerprint scanner security system,
look at how the password and ID cards stacked in
      a conventional system, find a way to fail.
Fingerprint Basics
Fingerprint is one of those bizarre twists of nature.
 Human ID card for easy access, because of the
built-in occur. Literally at your fingertips, a unique
   design that represents you alone, have. This
  particular adaptation, because the people were
 very beneficial to the ancestors of human beings
  have a small bump on the skin of their fingers.
 Pattern of ridges and finger "valleys" in the same
way, the rubber tread pattern helps a tire grip the
road surface can be easily carried in your hand to
                        the grip.
Optical Scanner
  It needs to get a picture of your fingers, and it is
   necessary to determine whether it matches the
     pattern of valleys and ridges of the scanned
     image in advance the pattern of valleys and
 ridges of this image - Scanner system fingerprint
there are two basic jobs. There are many ways to
     get a picture of someone's finger. The most
common methods today are optical scanning and
   capacitance scanning. The heart of the optical
    scanner, a charge coupled device (CCD), an
 optical sensor system is the same as those used
         in digital cameras and camcorders.
Capacitance Scanner
 Similar to optical scanners, capacitive fingerprint
   scanners to produce images that make up the
   fingerprint ridges and valleys. When you print
   using light sensing Instead, use the capacitor
 current. The sensor is composed of one or more
  semiconductor chips containing an array of tiny
cells. The sensor, integrator, and is connected to
an electrical circuit that is built around an inverting
 op amp. As with any amplifier, inverting amplifier
   based on a different variation of the current to
              change the current ones.
Analysis
Most fingerprint scanner system, fingerprint called
      minutiae in general, to compare specific
    characteristics. In general, human-computer
  scientists to focus on the point where one ridge
    splits in two lines and the edge of the ridge.
     Collectively, these and other features are
   sometimes called Tipika. The scanner system
software to recognize these characteristic points,
we use very complex algorithms to analyze. The
  basic idea is the same type and how you might
 recognize the relative position of stars in the sky
part is to measure the relative positions of feature
                         points.
Pros and Cons

Past "you have" to get the system, such as an ID
   card with magnetic stripe "tokens," must be
certain. "You know" the system, you must enter a
   password or PIN number. Systems such as
    fingerprint scanners, there are a number of
advantages compared to other systems. Physical
 attributes are much harder to fake than identity
cards. It is not possible to infer the pattern of the
  fingerprint. Fingerprint, iris and voice can not
   forget it. You can not forget your fingerprint.

More Related Content

What's hot

How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
KS
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 
Slidedayo
SlidedayoSlidedayo
Slidedayo
s1180179
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
Anzu Nakada
 
Prezen3
Prezen3Prezen3
Prezen3
s1170036
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
oceanflying
 
Fingerprintscanner
FingerprintscannerFingerprintscanner
Fingerprintscanner
Ai Hirasawa
 
G12
G12G12
Sw 12 B
Sw 12 BSw 12 B
Sw 12 B
s1200010
 
Finalgesture22
Finalgesture22Finalgesture22
Finalgesture22
sandeep reddy
 
Gesture recognition techniques
Gesture  recognition techniques Gesture  recognition techniques
Gesture recognition techniques
Akhil Garg
 
GESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGYGESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGY
jinal thakrar
 
week12
week12week12
week12
s1170016
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognition
PrachiWadekar
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
s1180002
 
Touchless fingerprint
Touchless fingerprintTouchless fingerprint
Touchless fingerprint
Piyush Mittal
 
Roy b2
Roy b2Roy b2
Roy b2
s1190004
 

What's hot (17)

How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Slidedayo
SlidedayoSlidedayo
Slidedayo
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Prezen3
Prezen3Prezen3
Prezen3
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Fingerprintscanner
FingerprintscannerFingerprintscanner
Fingerprintscanner
 
G12
G12G12
G12
 
Sw 12 B
Sw 12 BSw 12 B
Sw 12 B
 
Finalgesture22
Finalgesture22Finalgesture22
Finalgesture22
 
Gesture recognition techniques
Gesture  recognition techniques Gesture  recognition techniques
Gesture recognition techniques
 
GESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGYGESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGY
 
week12
week12week12
week12
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognition
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
Touchless fingerprint
Touchless fingerprintTouchless fingerprint
Touchless fingerprint
 
Roy b2
Roy b2Roy b2
Roy b2
 

Similar to Sw2assignment

Roy3
Roy3Roy3
Week12
Week12Week12
Week12
s1170005
 
assignment
assignmentassignment
assignment
s1190098
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
Shouta Yoshida
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
Takhiro Ogino
 
Kadai2
Kadai2Kadai2
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
RaxTonProduction
 
Week12group
Week12groupWeek12group
Week12group
sakuma002
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
Akash Patel
 
Kadai2
Kadai2Kadai2
Kadai2
guest2ceeb8
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
oceanflying
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
s1190106
 
Ex12
Ex12Ex12
Ex12
kizudora
 
Eigo1 1
Eigo1 1Eigo1 1
Eigo1 1
takainaa
 
Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27
s1170050
 
Sw week12
Sw week12Sw week12
Sw week12
s1190086
 
2
22
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
Abhishek Kumar
 
Prezen2
Prezen2Prezen2
Prezen2
s1170034
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
Dharmendrasingh417
 

Similar to Sw2assignment (20)

Roy3
Roy3Roy3
Roy3
 
Week12
Week12Week12
Week12
 
assignment
assignmentassignment
assignment
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Kadai2
Kadai2Kadai2
Kadai2
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
Week12group
Week12groupWeek12group
Week12group
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
Kadai2
Kadai2Kadai2
Kadai2
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
 
Ex12
Ex12Ex12
Ex12
 
Eigo1 1
Eigo1 1Eigo1 1
Eigo1 1
 
Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27
 
Sw week12
Sw week12Sw week12
Sw week12
 
2
22
2
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Prezen2
Prezen2Prezen2
Prezen2
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 

Recently uploaded

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Sw2assignment

  • 1. How Fingerprint Scanners Work Computerized fingerprint scanners have been mainstay of spy thrillers for decades, until recently, they were very exotic technology in the real world. In recent years, the scanner has begun in many places. Instead of the computer is protected by a high-tech biometrics, in addition to a password to gain access you need a unique print. The fingerprint scanner security system, look at how the password and ID cards stacked in a conventional system, find a way to fail.
  • 2. Fingerprint Basics Fingerprint is one of those bizarre twists of nature. Human ID card for easy access, because of the built-in occur. Literally at your fingertips, a unique design that represents you alone, have. This particular adaptation, because the people were very beneficial to the ancestors of human beings have a small bump on the skin of their fingers. Pattern of ridges and finger "valleys" in the same way, the rubber tread pattern helps a tire grip the road surface can be easily carried in your hand to the grip.
  • 3. Optical Scanner It needs to get a picture of your fingers, and it is necessary to determine whether it matches the pattern of valleys and ridges of the scanned image in advance the pattern of valleys and ridges of this image - Scanner system fingerprint there are two basic jobs. There are many ways to get a picture of someone's finger. The most common methods today are optical scanning and capacitance scanning. The heart of the optical scanner, a charge coupled device (CCD), an optical sensor system is the same as those used in digital cameras and camcorders.
  • 4. Capacitance Scanner Similar to optical scanners, capacitive fingerprint scanners to produce images that make up the fingerprint ridges and valleys. When you print using light sensing Instead, use the capacitor current. The sensor is composed of one or more semiconductor chips containing an array of tiny cells. The sensor, integrator, and is connected to an electrical circuit that is built around an inverting op amp. As with any amplifier, inverting amplifier based on a different variation of the current to change the current ones.
  • 5. Analysis Most fingerprint scanner system, fingerprint called minutiae in general, to compare specific characteristics. In general, human-computer scientists to focus on the point where one ridge splits in two lines and the edge of the ridge. Collectively, these and other features are sometimes called Tipika. The scanner system software to recognize these characteristic points, we use very complex algorithms to analyze. The basic idea is the same type and how you might recognize the relative position of stars in the sky part is to measure the relative positions of feature points.
  • 6. Pros and Cons Past "you have" to get the system, such as an ID card with magnetic stripe "tokens," must be certain. "You know" the system, you must enter a password or PIN number. Systems such as fingerprint scanners, there are a number of advantages compared to other systems. Physical attributes are much harder to fake than identity cards. It is not possible to infer the pattern of the fingerprint. Fingerprint, iris and voice can not forget it. You can not forget your fingerprint.