SlideShare a Scribd company logo
How Fingerprint Scanners Work

 Introduction to How Fingerprint Scanners Work

Computerized fingerprint scanners were pretty exotic
 technology in the real world for recently.In the past few
 years, however, scanners have started popping up all over
 the place -- in police stations, high-security buildings and
 even on PC keyboards, and cellphones.
We'll also see how fingerprint scanner security systems
 stack up to conventional password and identity card
 systems, and find out how they can fail.
Fingerprint Basics

Fingerprints are one of those bizarre twists of nature.
 Human beings happen to have built-in, easily
 accessible identity cards.

The other function of fingerprints is a total coincidence.
 Like everything in the human body, these ridges form
 through a combination of genetic and environmental
 factors. The genetic code in DNA gives general orders
 on the way skin should form in a developing fetus, but
 the specific way it forms is a result of random events.
Fingerprint Basics 2

fingerprints are a unique marker for a person, even an
  identical twin. And while two prints may look basically
  the same at a glance, a trained investigator or an
  advanced piece of software can pick out clear, defined
  differences.

This is the basic idea of fingerprint analysis, in both
 crime investigation and security. A fingerprint
 scanner's job is to take the place of a human analyst
 by collecting a print sample and comparing it to other
 samples on record. In the next few sections, we'll find
 out how scanners do this.
Optical Scanner
A fingerprint scanner system has two basic jobs, and it needs to
 determine whether the pattern of ridges and valleys in this
 image matches the pattern of ridges and valleys in pre-scanned
 images.

There are a number of different ways to get an image of
 somebody's finger. The most common methods today are
 optical scanning and capacitance scanning. Both types come
 up with the same sort of image, but they go about it in
 completely different ways.

The heart of an optical scanner is a charge coupled device
 (CCD), the same light sensor system used in digital cameras
 and camcorders. A CCD is simply an array of light-sensitive
 diodes called photosites.
Capacitance Scanner

The scanner processor reads this voltage output and determines
whether it is characteristic of a ridge or a valley. By reading every
cell in the sensor array, the processor can put together an overall
picture of the fingerprint, similar to the image captured by an
optical scanner.

The main advantage of a capacitive scanner is that it requires a
real fingerprint-type shape, rather than the pattern of light and dark
that makes up the visual impression of a fingerprint. This makes
the system harder to trick. Additionally, since they use a
semiconductor chip rather than a CCD unit, capacitive scanners
tend to be more compact that optical devices.
Analysis

The scanner system software uses highly complex
algorithms to recognize and analyze these minutiae. The
basic idea is to measure the relative positions of
minutiae, in the same sort of way you might recognize a
part of the sky by the relative positions of stars. A simple
way to think of it is to consider the shapes that various
minutia form when you draw straight lines between them.
If two prints have three ridge endings and two
bifurcations, forming the same shape with the same
dimensions, there's a high likelihood they're from the
same print.

More Related Content

What's hot

Kadai2
Kadai2Kadai2
Kadai2
guest2ceeb8
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
Shota Suzuki
 
Sensors On 3d Digitization
Sensors On 3d DigitizationSensors On 3d Digitization
Sensors On 3d Digitization
Rajan Kumar
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
University of Aizu
 
roy 12 B
 roy 12 B roy 12 B
roy 12 B
s1190108
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 
assignment
assignmentassignment
assignment
yauyausirokunaru
 
Scanner
ScannerScanner
Scanner
Nikhil Jha
 
week12
week12week12
week12
s1170016
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
Akash Patel
 
3 d scanning technology
3 d scanning technology3 d scanning technology
input devices By ZAK
input devices By ZAKinput devices By ZAK
input devices By ZAK
Tabsheer Hasan
 
Sw2 week12
Sw2 week12Sw2 week12
Sw2 week12
gomen
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
Shouta Yoshida
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognition
Nikhil Jha
 
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
International Journal of Technical Research & Application
 
Natural Hand Gestures Recognition System for Intelligent HCI: A Survey
Natural Hand Gestures Recognition System for Intelligent HCI: A SurveyNatural Hand Gestures Recognition System for Intelligent HCI: A Survey
Natural Hand Gestures Recognition System for Intelligent HCI: A Survey
Editor IJCATR
 
Technological advancements in sci vis
Technological advancements in sci visTechnological advancements in sci vis
Technological advancements in sci vis
Charles Flynt
 

What's hot (18)

Kadai2
Kadai2Kadai2
Kadai2
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Sensors On 3d Digitization
Sensors On 3d DigitizationSensors On 3d Digitization
Sensors On 3d Digitization
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
roy 12 B
 roy 12 B roy 12 B
roy 12 B
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
assignment
assignmentassignment
assignment
 
Scanner
ScannerScanner
Scanner
 
week12
week12week12
week12
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
3 d scanning technology
3 d scanning technology3 d scanning technology
3 d scanning technology
 
input devices By ZAK
input devices By ZAKinput devices By ZAK
input devices By ZAK
 
Sw2 week12
Sw2 week12Sw2 week12
Sw2 week12
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognition
 
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
 
Natural Hand Gestures Recognition System for Intelligent HCI: A Survey
Natural Hand Gestures Recognition System for Intelligent HCI: A SurveyNatural Hand Gestures Recognition System for Intelligent HCI: A Survey
Natural Hand Gestures Recognition System for Intelligent HCI: A Survey
 
Technological advancements in sci vis
Technological advancements in sci visTechnological advancements in sci vis
Technological advancements in sci vis
 

Viewers also liked

Week3
Week3Week3
Week3
s1170005
 
IBM Reseach website
IBM Reseach websiteIBM Reseach website
IBM Reseach website
s1170005
 
Week 13 Slide
Week 13 SlideWeek 13 Slide
Week 13 Slide
s1170005
 
Final pre 6
Final pre 6Final pre 6
Final pre 6
s1170005
 
Adeneo Embedded stay tuned
Adeneo Embedded stay tuned Adeneo Embedded stay tuned
Adeneo Embedded stay tuned
Witekio
 
Week11
Week11Week11
Week11
s1170005
 
Week12
Week12Week12
Week12
s1170005
 
Final pre 5
Final pre 5Final pre 5
Final pre 5
s1170005
 
How Rss Works
How Rss WorksHow Rss Works
How Rss Works
s1170005
 
Nepal, 2007
Nepal, 2007Nepal, 2007
Nepal, 2007
ohadr
 
Continuous Integration for BSP
Continuous Integration for BSPContinuous Integration for BSP
Continuous Integration for BSP
Witekio
 
Witekio custom modern qt quick components
Witekio custom modern qt quick componentsWitekio custom modern qt quick components
Witekio custom modern qt quick components
Witekio
 
Witekio IoT presentation
Witekio IoT presentation Witekio IoT presentation
Witekio IoT presentation
Witekio
 
Witekio Corporate Presentation Q42016
Witekio Corporate Presentation Q42016Witekio Corporate Presentation Q42016
Witekio Corporate Presentation Q42016
Witekio
 
Budapest Treaty Presented
Budapest Treaty PresentedBudapest Treaty Presented
Budapest Treaty Presented
guestfcb11e
 

Viewers also liked (15)

Week3
Week3Week3
Week3
 
IBM Reseach website
IBM Reseach websiteIBM Reseach website
IBM Reseach website
 
Week 13 Slide
Week 13 SlideWeek 13 Slide
Week 13 Slide
 
Final pre 6
Final pre 6Final pre 6
Final pre 6
 
Adeneo Embedded stay tuned
Adeneo Embedded stay tuned Adeneo Embedded stay tuned
Adeneo Embedded stay tuned
 
Week11
Week11Week11
Week11
 
Week12
Week12Week12
Week12
 
Final pre 5
Final pre 5Final pre 5
Final pre 5
 
How Rss Works
How Rss WorksHow Rss Works
How Rss Works
 
Nepal, 2007
Nepal, 2007Nepal, 2007
Nepal, 2007
 
Continuous Integration for BSP
Continuous Integration for BSPContinuous Integration for BSP
Continuous Integration for BSP
 
Witekio custom modern qt quick components
Witekio custom modern qt quick componentsWitekio custom modern qt quick components
Witekio custom modern qt quick components
 
Witekio IoT presentation
Witekio IoT presentation Witekio IoT presentation
Witekio IoT presentation
 
Witekio Corporate Presentation Q42016
Witekio Corporate Presentation Q42016Witekio Corporate Presentation Q42016
Witekio Corporate Presentation Q42016
 
Budapest Treaty Presented
Budapest Treaty PresentedBudapest Treaty Presented
Budapest Treaty Presented
 

Similar to Week12

Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
Haruki0428
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
guest13f6ca
 
Ex12
Ex12Ex12
Ex12
kizudora
 
Week12group
Week12groupWeek12group
Week12group
sakuma002
 
Sw week12
Sw week12Sw week12
Sw week12
s1190086
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
s1180002
 
Prezen3
Prezen3Prezen3
Prezen3
s1170036
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
s1190106
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
Takhiro Ogino
 
Group Slide Presentation: Week 12
Group Slide Presentation: Week 12Group Slide Presentation: Week 12
Group Slide Presentation: Week 12
motoki_guransahal
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
iamsanjayk
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
Anzu Nakada
 
Assig b w12p1
Assig b w12p1Assig b w12p1
Assig b w12p1
Haruqa01
 
2
22
Roy
RoyRoy
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
oceanflying
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
oceanflying
 
Eigo1 1
Eigo1 1Eigo1 1
Eigo1 1
takainaa
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
Dharmendrasingh417
 
assignment
assignmentassignment
assignment
s1190098
 

Similar to Week12 (20)

Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Ex12
Ex12Ex12
Ex12
 
Week12group
Week12groupWeek12group
Week12group
 
Sw week12
Sw week12Sw week12
Sw week12
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
Prezen3
Prezen3Prezen3
Prezen3
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Group Slide Presentation: Week 12
Group Slide Presentation: Week 12Group Slide Presentation: Week 12
Group Slide Presentation: Week 12
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Assig b w12p1
Assig b w12p1Assig b w12p1
Assig b w12p1
 
2
22
2
 
Roy
RoyRoy
Roy
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
 
Eigo1 1
Eigo1 1Eigo1 1
Eigo1 1
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
assignment
assignmentassignment
assignment
 

More from s1170005

Dell
DellDell
Dell
s1170005
 
Sakura
SakuraSakura
Sakura
s1170005
 
Week3
Week3Week3
Week3
s1170005
 
Week4
Week4Week4
Week4
s1170005
 
Week3
Week3Week3
Week3
s1170005
 
Week 13 Slide
Week 13 SlideWeek 13 Slide
Week 13 Slide
s1170005
 
Week12
Week12Week12
Week12
s1170005
 

More from s1170005 (7)

Dell
DellDell
Dell
 
Sakura
SakuraSakura
Sakura
 
Week3
Week3Week3
Week3
 
Week4
Week4Week4
Week4
 
Week3
Week3Week3
Week3
 
Week 13 Slide
Week 13 SlideWeek 13 Slide
Week 13 Slide
 
Week12
Week12Week12
Week12
 

Recently uploaded

Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Week12

  • 1. How Fingerprint Scanners Work Introduction to How Fingerprint Scanners Work Computerized fingerprint scanners were pretty exotic technology in the real world for recently.In the past few years, however, scanners have started popping up all over the place -- in police stations, high-security buildings and even on PC keyboards, and cellphones. We'll also see how fingerprint scanner security systems stack up to conventional password and identity card systems, and find out how they can fail.
  • 2. Fingerprint Basics Fingerprints are one of those bizarre twists of nature. Human beings happen to have built-in, easily accessible identity cards. The other function of fingerprints is a total coincidence. Like everything in the human body, these ridges form through a combination of genetic and environmental factors. The genetic code in DNA gives general orders on the way skin should form in a developing fetus, but the specific way it forms is a result of random events.
  • 3. Fingerprint Basics 2 fingerprints are a unique marker for a person, even an identical twin. And while two prints may look basically the same at a glance, a trained investigator or an advanced piece of software can pick out clear, defined differences. This is the basic idea of fingerprint analysis, in both crime investigation and security. A fingerprint scanner's job is to take the place of a human analyst by collecting a print sample and comparing it to other samples on record. In the next few sections, we'll find out how scanners do this.
  • 4. Optical Scanner A fingerprint scanner system has two basic jobs, and it needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images. There are a number of different ways to get an image of somebody's finger. The most common methods today are optical scanning and capacitance scanning. Both types come up with the same sort of image, but they go about it in completely different ways. The heart of an optical scanner is a charge coupled device (CCD), the same light sensor system used in digital cameras and camcorders. A CCD is simply an array of light-sensitive diodes called photosites.
  • 5. Capacitance Scanner The scanner processor reads this voltage output and determines whether it is characteristic of a ridge or a valley. By reading every cell in the sensor array, the processor can put together an overall picture of the fingerprint, similar to the image captured by an optical scanner. The main advantage of a capacitive scanner is that it requires a real fingerprint-type shape, rather than the pattern of light and dark that makes up the visual impression of a fingerprint. This makes the system harder to trick. Additionally, since they use a semiconductor chip rather than a CCD unit, capacitive scanners tend to be more compact that optical devices.
  • 6. Analysis The scanner system software uses highly complex algorithms to recognize and analyze these minutiae. The basic idea is to measure the relative positions of minutiae, in the same sort of way you might recognize a part of the sky by the relative positions of stars. A simple way to think of it is to consider the shapes that various minutia form when you draw straight lines between them. If two prints have three ridge endings and two bifurcations, forming the same shape with the same dimensions, there's a high likelihood they're from the same print.