SlideShare a Scribd company logo
1 of 15
FINGERPRINT:FINGER BIOMETRICS
by Rajasekaran.T
INTRODUCTION
 Fingerprinting was first created by Dr.
Henry Fault, a British surgeon in 1882.
 It based on “KEY”.
Fingerprint Patterns
 Arch- The ridges enter from one side of the finger, rise in
the centre forming an arc, and then exit the other side of the
finger.
 Loop-The ridges enter from one side of a finger, form a
curve, and then exit on that same side.
 Whorl-Ridges form circularly around a central point on
the finger.
Arch Loop Whorl
Sales
Loop
whorl
Arch
The human population has fingerprints in the following
percentages:
Loop – 65%
Whorl -- 30%
Arch -- 5%
population
Loop
Whorl
Arch
Whorl
1.Double Loop
Whorl.
2.Plan whorl.
3.Central.
pocket Loop whorl.
4.Accidental whorl.
Loop
1.Uinar Loop.
2.Radial Loop.
Arch
1.Plain Arch.
2.Tented Arch.
Different Identification on Fingerprint
Crossover: two ridges cross
each other
Core: centre
Bifurcation: ridge separates
Ridge ending: end point
Island: small ridge b/w two
spaces
Delta: space between ridges
Pore: human pore
Bifurcation Bridge Dot Double bifurcation
Opposed
bifurcation
Island (short
ridge)
Hook (spur) Lake (enclosure)
Ridge crossing Ridge ending Trifurcation
Opposed
bifurcation/ridge
ending)
Fingerprint matching techniques
There are two categories of fingerprint matching techniques:
1. minutiae-based .
2. correlation based.
 Minutiae-based techniques first find minutiae points and then
map their relative placement on the finger.
 The correlation-based method is able to overcome some of the
difficulties of the minutiae-based approach.
Two main technologies used to capture image of the fingerprint
Optical sensor – use light refracted through a prism. An optical sensor
based reader uses light to read and acquire fingerprint images. Optical
sensors can be affected by a number of real life factors such as stray
light, surface contamination or even prior fingerprint impressions
present on the sensor surface. Hence it is essential to clean the
fingerprint reader glass on a regular basis for optimal performance.
Capacitive sensor – detect voltage changes in skin between ridges and
valleys. Capacitive sensors use electric current to sense a fingerprint
and capture the image. As sensors apply a small voltage to the finger, a
real fingerprint is required rather than a visual impression of it. This
technique makes the fingerprint reader more reliable as it becomes
harder to fake enrolment.
Image Processing
Capture the fingerprint images and process them through a series of
image processing algorithms to obtain a clear unambiguous skeletal
image of the original gray tone impression, clarifying smudged
areas, removing extraneous artifacts and healing most scars, cuts and
breaks.
Bio-Link SDK
Advantage of Fingerprint:
a. Very high accuracy.
b. Is the most economical biometric PC user authentication technique.
c. Easy to use.
d. Small storage space required for the biometric template, reducing the
size of the database memory required
e. It is standardized.
Disadvantage of Fingerprint:
a. For some people it is very intrusive, because is still related to criminal
identification.
b. It can make mistakes with the dryness or dirty of the finger’s skin, as well
as with the age (is not appropriate with children, because the size of their
fingerprint changes quickly).
-THANK YOU-

More Related Content

What's hot

Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
guest8cbcb02
 
Fingerprints
FingerprintsFingerprints
Fingerprints
abelts
 
Friction Skin Identification
Friction Skin IdentificationFriction Skin Identification
Friction Skin Identification
Jury Rocamora
 

What's hot (20)

Fingerprints
FingerprintsFingerprints
Fingerprints
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
Fingerprint - Everything You Need To Know About Fingerprints
Fingerprint - Everything You Need To Know About FingerprintsFingerprint - Everything You Need To Know About Fingerprints
Fingerprint - Everything You Need To Know About Fingerprints
 
Fingerprint Pattern
Fingerprint PatternFingerprint Pattern
Fingerprint Pattern
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Latent fingerprint development
Latent fingerprint developmentLatent fingerprint development
Latent fingerprint development
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Forensic examination of stamp, seal and other mechanical impressions
Forensic examination of stamp, seal and other mechanical impressionsForensic examination of stamp, seal and other mechanical impressions
Forensic examination of stamp, seal and other mechanical impressions
 
FINGER_PRINT_HISTORY.ppt
FINGER_PRINT_HISTORY.pptFINGER_PRINT_HISTORY.ppt
FINGER_PRINT_HISTORY.ppt
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Alternative light sources of fingerprint development Part 1.pptx
Alternative light sources of fingerprint development Part 1.pptxAlternative light sources of fingerprint development Part 1.pptx
Alternative light sources of fingerprint development Part 1.pptx
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
 
Forensic Science - 05 Fingerprints
Forensic Science - 05 FingerprintsForensic Science - 05 Fingerprints
Forensic Science - 05 Fingerprints
 
Fingerprints, Footprint Impressions, and Tire Impressions
Fingerprints, Footprint Impressions, and Tire ImpressionsFingerprints, Footprint Impressions, and Tire Impressions
Fingerprints, Footprint Impressions, and Tire Impressions
 
Friction Skin Identification
Friction Skin IdentificationFriction Skin Identification
Friction Skin Identification
 
FINGERPRINTS
FINGERPRINTSFINGERPRINTS
FINGERPRINTS
 

Similar to Fingerprint presentation

fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 
Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27
s1170050
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
oceanflying
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
oceanflying
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
s1180002
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
Haruki0428
 
How fingerprint Works
How fingerprint WorksHow fingerprint Works
How fingerprint Works
s1190017
 
SW2 s1190089person#2
SW2 s1190089person#2SW2 s1190089person#2
SW2 s1190089person#2
s1190089
 

Similar to Fingerprint presentation (20)

Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint Recognition
 
Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprints
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Slidedayo
SlidedayoSlidedayo
Slidedayo
 
Seminar
SeminarSeminar
Seminar
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
How fingerprint Works
How fingerprint WorksHow fingerprint Works
How fingerprint Works
 
SW2 s1190089person#2
SW2 s1190089person#2SW2 s1190089person#2
SW2 s1190089person#2
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Fingerprint presentation

  • 2. INTRODUCTION  Fingerprinting was first created by Dr. Henry Fault, a British surgeon in 1882.  It based on “KEY”.
  • 3. Fingerprint Patterns  Arch- The ridges enter from one side of the finger, rise in the centre forming an arc, and then exit the other side of the finger.  Loop-The ridges enter from one side of a finger, form a curve, and then exit on that same side.  Whorl-Ridges form circularly around a central point on the finger. Arch Loop Whorl
  • 4. Sales Loop whorl Arch The human population has fingerprints in the following percentages: Loop – 65% Whorl -- 30% Arch -- 5% population Loop Whorl Arch
  • 5. Whorl 1.Double Loop Whorl. 2.Plan whorl. 3.Central. pocket Loop whorl. 4.Accidental whorl. Loop 1.Uinar Loop. 2.Radial Loop. Arch 1.Plain Arch. 2.Tented Arch.
  • 6. Different Identification on Fingerprint Crossover: two ridges cross each other Core: centre Bifurcation: ridge separates Ridge ending: end point Island: small ridge b/w two spaces Delta: space between ridges Pore: human pore
  • 7. Bifurcation Bridge Dot Double bifurcation Opposed bifurcation Island (short ridge) Hook (spur) Lake (enclosure) Ridge crossing Ridge ending Trifurcation Opposed bifurcation/ridge ending)
  • 8. Fingerprint matching techniques There are two categories of fingerprint matching techniques: 1. minutiae-based . 2. correlation based.  Minutiae-based techniques first find minutiae points and then map their relative placement on the finger.  The correlation-based method is able to overcome some of the difficulties of the minutiae-based approach.
  • 9. Two main technologies used to capture image of the fingerprint Optical sensor – use light refracted through a prism. An optical sensor based reader uses light to read and acquire fingerprint images. Optical sensors can be affected by a number of real life factors such as stray light, surface contamination or even prior fingerprint impressions present on the sensor surface. Hence it is essential to clean the fingerprint reader glass on a regular basis for optimal performance. Capacitive sensor – detect voltage changes in skin between ridges and valleys. Capacitive sensors use electric current to sense a fingerprint and capture the image. As sensors apply a small voltage to the finger, a real fingerprint is required rather than a visual impression of it. This technique makes the fingerprint reader more reliable as it becomes harder to fake enrolment.
  • 10. Image Processing Capture the fingerprint images and process them through a series of image processing algorithms to obtain a clear unambiguous skeletal image of the original gray tone impression, clarifying smudged areas, removing extraneous artifacts and healing most scars, cuts and breaks.
  • 11.
  • 12.
  • 14. Advantage of Fingerprint: a. Very high accuracy. b. Is the most economical biometric PC user authentication technique. c. Easy to use. d. Small storage space required for the biometric template, reducing the size of the database memory required e. It is standardized. Disadvantage of Fingerprint: a. For some people it is very intrusive, because is still related to criminal identification. b. It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly).