SlideShare a Scribd company logo
1 of 15
FINGERPRINT:FINGER BIOMETRICS
by Rajasekaran.T
INTRODUCTION
 Fingerprinting was first created by Dr.
Henry Fault, a British surgeon in 1882.
 It based on “KEY”.
Fingerprint Patterns
 Arch- The ridges enter from one side of the finger, rise in
the centre forming an arc, and then exit the other side of the
finger.
 Loop-The ridges enter from one side of a finger, form a
curve, and then exit on that same side.
 Whorl-Ridges form circularly around a central point on
the finger.
Arch Loop Whorl
Sales
Loop
whorl
Arch
The human population has fingerprints in the following
percentages:
Loop – 65%
Whorl -- 30%
Arch -- 5%
population
Loop
Whorl
Arch
Whorl
1.Double Loop
Whorl.
2.Plan whorl.
3.Central.
pocket Loop whorl.
4.Accidental whorl.
Loop
1.Uinar Loop.
2.Radial Loop.
Arch
1.Plain Arch.
2.Tented Arch.
Different Identification on Fingerprint
Crossover: two ridges cross
each other
Core: centre
Bifurcation: ridge separates
Ridge ending: end point
Island: small ridge b/w two
spaces
Delta: space between ridges
Pore: human pore
Bifurcation Bridge Dot Double bifurcation
Opposed
bifurcation
Island (short
ridge)
Hook (spur) Lake (enclosure)
Ridge crossing Ridge ending Trifurcation
Opposed
bifurcation/ridge
ending)
Fingerprint matching techniques
There are two categories of fingerprint matching techniques:
1. minutiae-based .
2. correlation based.
 Minutiae-based techniques first find minutiae points and then
map their relative placement on the finger.
 The correlation-based method is able to overcome some of the
difficulties of the minutiae-based approach.
Two main technologies used to capture image of the fingerprint
Optical sensor – use light refracted through a prism. An optical sensor
based reader uses light to read and acquire fingerprint images. Optical
sensors can be affected by a number of real life factors such as stray
light, surface contamination or even prior fingerprint impressions
present on the sensor surface. Hence it is essential to clean the
fingerprint reader glass on a regular basis for optimal performance.
Capacitive sensor – detect voltage changes in skin between ridges and
valleys. Capacitive sensors use electric current to sense a fingerprint
and capture the image. As sensors apply a small voltage to the finger, a
real fingerprint is required rather than a visual impression of it. This
technique makes the fingerprint reader more reliable as it becomes
harder to fake enrolment.
Image Processing
Capture the fingerprint images and process them through a series of
image processing algorithms to obtain a clear unambiguous skeletal
image of the original gray tone impression, clarifying smudged
areas, removing extraneous artifacts and healing most scars, cuts and
breaks.
Bio-Link SDK
Advantage of Fingerprint:
a. Very high accuracy.
b. Is the most economical biometric PC user authentication technique.
c. Easy to use.
d. Small storage space required for the biometric template, reducing the
size of the database memory required
e. It is standardized.
Disadvantage of Fingerprint:
a. For some people it is very intrusive, because is still related to criminal
identification.
b. It can make mistakes with the dryness or dirty of the finger’s skin, as well
as with the age (is not appropriate with children, because the size of their
fingerprint changes quickly).
-THANK YOU-

More Related Content

What's hot

fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 
Fingerprints
FingerprintsFingerprints
Fingerprints
abelts
 

What's hot (20)

1.4 Performance Measures.ppt
1.4 Performance Measures.ppt1.4 Performance Measures.ppt
1.4 Performance Measures.ppt
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Fingerprinting
FingerprintingFingerprinting
Fingerprinting
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Pattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionPattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognition
 
Fingerprints, Footprint Impressions, and Tire Impressions
Fingerprints, Footprint Impressions, and Tire ImpressionsFingerprints, Footprint Impressions, and Tire Impressions
Fingerprints, Footprint Impressions, and Tire Impressions
 
Fingerprint recognition algorithm
Fingerprint recognition algorithmFingerprint recognition algorithm
Fingerprint recognition algorithm
 
Automated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsAutomated Fingerprint Identification Systems
Automated Fingerprint Identification Systems
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint history0911
Fingerprint history0911Fingerprint history0911
Fingerprint history0911
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 

Similar to Fingerprint presentation

Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27
s1170050
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
oceanflying
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
oceanflying
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
s1180002
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
Haruki0428
 
How fingerprint Works
How fingerprint WorksHow fingerprint Works
How fingerprint Works
s1190017
 
SW2 s1190089person#2
SW2 s1190089person#2SW2 s1190089person#2
SW2 s1190089person#2
s1190089
 

Similar to Fingerprint presentation (20)

Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint Recognition
 
Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprints
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
Slidedayo
SlidedayoSlidedayo
Slidedayo
 
Seminar
SeminarSeminar
Seminar
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
How fingerprint Works
How fingerprint WorksHow fingerprint Works
How fingerprint Works
 
SW2 s1190089person#2
SW2 s1190089person#2SW2 s1190089person#2
SW2 s1190089person#2
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
If2615981604
If2615981604If2615981604
If2615981604
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Fingerprint presentation

  • 2. INTRODUCTION  Fingerprinting was first created by Dr. Henry Fault, a British surgeon in 1882.  It based on “KEY”.
  • 3. Fingerprint Patterns  Arch- The ridges enter from one side of the finger, rise in the centre forming an arc, and then exit the other side of the finger.  Loop-The ridges enter from one side of a finger, form a curve, and then exit on that same side.  Whorl-Ridges form circularly around a central point on the finger. Arch Loop Whorl
  • 4. Sales Loop whorl Arch The human population has fingerprints in the following percentages: Loop – 65% Whorl -- 30% Arch -- 5% population Loop Whorl Arch
  • 5. Whorl 1.Double Loop Whorl. 2.Plan whorl. 3.Central. pocket Loop whorl. 4.Accidental whorl. Loop 1.Uinar Loop. 2.Radial Loop. Arch 1.Plain Arch. 2.Tented Arch.
  • 6. Different Identification on Fingerprint Crossover: two ridges cross each other Core: centre Bifurcation: ridge separates Ridge ending: end point Island: small ridge b/w two spaces Delta: space between ridges Pore: human pore
  • 7. Bifurcation Bridge Dot Double bifurcation Opposed bifurcation Island (short ridge) Hook (spur) Lake (enclosure) Ridge crossing Ridge ending Trifurcation Opposed bifurcation/ridge ending)
  • 8. Fingerprint matching techniques There are two categories of fingerprint matching techniques: 1. minutiae-based . 2. correlation based.  Minutiae-based techniques first find minutiae points and then map their relative placement on the finger.  The correlation-based method is able to overcome some of the difficulties of the minutiae-based approach.
  • 9. Two main technologies used to capture image of the fingerprint Optical sensor – use light refracted through a prism. An optical sensor based reader uses light to read and acquire fingerprint images. Optical sensors can be affected by a number of real life factors such as stray light, surface contamination or even prior fingerprint impressions present on the sensor surface. Hence it is essential to clean the fingerprint reader glass on a regular basis for optimal performance. Capacitive sensor – detect voltage changes in skin between ridges and valleys. Capacitive sensors use electric current to sense a fingerprint and capture the image. As sensors apply a small voltage to the finger, a real fingerprint is required rather than a visual impression of it. This technique makes the fingerprint reader more reliable as it becomes harder to fake enrolment.
  • 10. Image Processing Capture the fingerprint images and process them through a series of image processing algorithms to obtain a clear unambiguous skeletal image of the original gray tone impression, clarifying smudged areas, removing extraneous artifacts and healing most scars, cuts and breaks.
  • 11.
  • 12.
  • 14. Advantage of Fingerprint: a. Very high accuracy. b. Is the most economical biometric PC user authentication technique. c. Easy to use. d. Small storage space required for the biometric template, reducing the size of the database memory required e. It is standardized. Disadvantage of Fingerprint: a. For some people it is very intrusive, because is still related to criminal identification. b. It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly).