SlideShare a Scribd company logo
Introduction to How Fingerprint
             Scanners Work

●   Computerized fingerprint scanners have
    been a mainstay of spy thrillers for de
    cades, but up until recently, they were
    pretty exotic technology in the real wo
    rld.
●   In this article, we'll examine the secr
    ets behind this exciting development in
    law enforcement and identity security.
Fingerprint Basics


●   Fingerprints are one of those bizarre t
    wists of nature.
●   Human beings happen to have built-in, e
    asily accessible identity cards.
●   You have a unique design, which represe
    nts you alone, literally at your finger
    tips.
Optical Scanner


●   A fingerprint scanner system has two ba
    sic jobs -- it needs to get an image of
    your finger, and it needs to determine
    whether the pattern of ridges and valle
    ys in this image matches the pattern of
    ridges and valleys in pre-scanned image
    s.
Capacitance Scanner


●   Like optical scanners, capacitive finge
    rprint scanners generate an image of th
    e ridges and valleys that make up a fin
    gerprint.
●   But instead of sensing the print using
    light, the capacitors use electrical cu
    rrent.
Analysis


●   n movies and TV shows, automated finger
    print analyzers typically overlay vario
    us fingerprint images to find a match.
●   In actuality, this isn't a particularly
    practical way to compare fingerprints.
Pros and Cons


●   There are several ways a security syste
    m can verify that somebody is an author
    ized user.
●   Most systems are looking for one or mor
    e of the following:
●    What you have
●    What you know
●    Who you are

More Related Content

What's hot

Slidedayo
SlidedayoSlidedayo
Slidedayo
s1180179
 
Smartquill
SmartquillSmartquill
Smartquill
Pramod Kumar
 
Smart quill seminar report final
Smart quill seminar report finalSmart quill seminar report final
Smart quill seminar report final
Pramod Kumar
 
Smart quill
Smart quillSmart quill
Smart quill
Mastan Shaik
 
Smart Quill Paras
Smart Quill ParasSmart Quill Paras
Smart Quill Paras
Paras Wadher
 
Ece smart quill ppt
Ece smart quill pptEce smart quill ppt
Ece smart quill ppt
pranay mamilla
 
Smartquill
SmartquillSmartquill
Smartquill
Arpit Patel
 
Smart Quill Pen
Smart Quill PenSmart Quill Pen
Smart Quill Pen
ijaranjani
 
Smart quill presentation by vikas
Smart quill presentation by vikasSmart quill presentation by vikas
Smart quill presentation by vikas
Vikas Gupta
 
Smartquill
SmartquillSmartquill
Smartquill
Srikanth Merupu
 
Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python
Arijit Mukherjee
 
Fingerprint ppt
Fingerprint pptFingerprint ppt
Fingerprint ppt
shubham raka
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
Veeral Bhateja
 
smart quill pen
smart quill pensmart quill pen
smart quill pen
ranjith12
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
jyothsna vanka
 
All About Sixth Sense Technology
All About Sixth Sense TechnologyAll About Sixth Sense Technology
All About Sixth Sense Technology
Vishmita Shetty
 
Sixth sense
Sixth senseSixth sense
Sixth sense
Deevena Dayaal
 
Smart quill
Smart quillSmart quill
Smart quill
najeeb Pasha
 
Kinect
KinectKinect
Kinect
Shoaib Khan
 
Sixth sense technology ppt
Sixth sense technology ppt Sixth sense technology ppt
Sixth sense technology ppt
PrashanthBeemanathi
 

What's hot (20)

Slidedayo
SlidedayoSlidedayo
Slidedayo
 
Smartquill
SmartquillSmartquill
Smartquill
 
Smart quill seminar report final
Smart quill seminar report finalSmart quill seminar report final
Smart quill seminar report final
 
Smart quill
Smart quillSmart quill
Smart quill
 
Smart Quill Paras
Smart Quill ParasSmart Quill Paras
Smart Quill Paras
 
Ece smart quill ppt
Ece smart quill pptEce smart quill ppt
Ece smart quill ppt
 
Smartquill
SmartquillSmartquill
Smartquill
 
Smart Quill Pen
Smart Quill PenSmart Quill Pen
Smart Quill Pen
 
Smart quill presentation by vikas
Smart quill presentation by vikasSmart quill presentation by vikas
Smart quill presentation by vikas
 
Smartquill
SmartquillSmartquill
Smartquill
 
Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python
 
Fingerprint ppt
Fingerprint pptFingerprint ppt
Fingerprint ppt
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
smart quill pen
smart quill pensmart quill pen
smart quill pen
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
 
All About Sixth Sense Technology
All About Sixth Sense TechnologyAll About Sixth Sense Technology
All About Sixth Sense Technology
 
Sixth sense
Sixth senseSixth sense
Sixth sense
 
Smart quill
Smart quillSmart quill
Smart quill
 
Kinect
KinectKinect
Kinect
 
Sixth sense technology ppt
Sixth sense technology ppt Sixth sense technology ppt
Sixth sense technology ppt
 

Similar to week12

How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
oceanflying
 
G12
G12G12
assignment
assignmentassignment
assignment
s1190098
 
assignment
assignmentassignment
assignment
yauyausirokunaru
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
KS
 
Prezen3
Prezen3Prezen3
Prezen3
s1170036
 
無題 1
無題 1無題 1
無題 1
s70013
 
Kadai2
Kadai2Kadai2
Fingerprintscanner
FingerprintscannerFingerprintscanner
Fingerprintscanner
Ai Hirasawa
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
University of Aizu
 
Roy3
Roy3Roy3
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
Anzu Nakada
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
Shota Suzuki
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
Shouta Yoshida
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
Takhiro Ogino
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
Shouta Yoshida
 
Roy b2
Roy b2Roy b2
Roy b2
s1190004
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
s1190106
 
Sw2assignment
Sw2assignmentSw2assignment
Sw2assignment
s1180051
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
Haruki0428
 

Similar to week12 (20)

How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
 
G12
G12G12
G12
 
assignment
assignmentassignment
assignment
 
assignment
assignmentassignment
assignment
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Prezen3
Prezen3Prezen3
Prezen3
 
無題 1
無題 1無題 1
無題 1
 
Kadai2
Kadai2Kadai2
Kadai2
 
Fingerprintscanner
FingerprintscannerFingerprintscanner
Fingerprintscanner
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
Roy3
Roy3Roy3
Roy3
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Roy b2
Roy b2Roy b2
Roy b2
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
 
Sw2assignment
Sw2assignmentSw2assignment
Sw2assignment
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

week12

  • 1. Introduction to How Fingerprint Scanners Work ● Computerized fingerprint scanners have been a mainstay of spy thrillers for de cades, but up until recently, they were pretty exotic technology in the real wo rld. ● In this article, we'll examine the secr ets behind this exciting development in law enforcement and identity security.
  • 2. Fingerprint Basics ● Fingerprints are one of those bizarre t wists of nature. ● Human beings happen to have built-in, e asily accessible identity cards. ● You have a unique design, which represe nts you alone, literally at your finger tips.
  • 3. Optical Scanner ● A fingerprint scanner system has two ba sic jobs -- it needs to get an image of your finger, and it needs to determine whether the pattern of ridges and valle ys in this image matches the pattern of ridges and valleys in pre-scanned image s.
  • 4. Capacitance Scanner ● Like optical scanners, capacitive finge rprint scanners generate an image of th e ridges and valleys that make up a fin gerprint. ● But instead of sensing the print using light, the capacitors use electrical cu rrent.
  • 5. Analysis ● n movies and TV shows, automated finger print analyzers typically overlay vario us fingerprint images to find a match. ● In actuality, this isn't a particularly practical way to compare fingerprints.
  • 6. Pros and Cons ● There are several ways a security syste m can verify that somebody is an author ized user. ● Most systems are looking for one or mor e of the following: ● What you have ● What you know ● Who you are