SlideShare une entreprise Scribd logo
1  sur  37
A
PRESENTATION
on
Fingerprint RecognisationFingerprint Recognisation
TechnologyTechnology
(f.r.t)(f.r.t)
BY:-
VISHWAS JANGRA
5909407
ECE(8TH
SEM)
Introduction:
 Definition of Biometrics:-
“Automated methods of recognizing a person based on a
physiological or behavioral characteristics”.
“ The technology used for identification of a user based on a
physical or behavioral characteristic, such as a fingerprint, iris,
face, voice or handwriting is called Biometrics”.
3
History of fingerprints
Human fingerprints have been discovered on a large number of
archaeological artifacts and historical items
In 1684, the English plant morphologist, Nehemiah Grew, published
the first scientific paper reporting his systematic study on the ridge,
furrow, and pore structure
In 1788, a detailed description of the anatomical formations of
fingerprints was made by Mayer.
In 1823, Purkinji proposed the first fingerprint classification, which
classified into nine categories
In 1975, The FBI funded the development of fingerprint scanners
Why FINGER PRINT?
Oldest form of Biometrics
High Reliablity
Uses distinctive features of fingers
Fingerprint Formation
6
Fingerprint sensing
Based on the mode of acquisition, a fingerprint image is classified as
Off line image
Live-scan image
There are a number of live-scan sensing mechanisms that can detect the
ridges and valleys present in the fingertip
Examples are
Optical FTIR
Capacitive
Pressure-based
Ultrasound
• classification is necessary to reduce the search time and computational
complexity.
• The FBI database has 70 million fingerprints.
Fingerprint Classification
Right Loop WhorlArch
8
The general structure of fingerprint scanner
Devices
Optical fingerprint sensor
FIU-001/500 by SONY
Electro-optical sensor
[DELSY® CMOS sensor modul]
Capacitive sensor
[FingerTIP™ by Infineon]
[ID Mouse by Siemens]
Keyboard [G 81-12000
by Cherry]
10
Fingerprint Sensors
Optical
Silicon Based Capacitive Sensors
Ultrasound
Thermal
Pyroelectric
Piezo-electric
Parameters characterizing a fingerprint
device are
 Resolution
 Area
 Number of pixels
 Geometric Accuracy
 Image Quality
 Interface
 Frames per second
 Automatic finger detection
 Encryption
 Supported operating systems
Optical Sensors
Oldest and most widely used technology.
Majority of companies use optical technology.
The finger is placed on a coated hard plastic plate.
In most devices, a charged coupled device (CCD) converts the image of
the fingerprint, with dark ridges and light valleys, into a digital signal.
The brightness is either adjusted automatically or manually, leading to a
usable image.
Optical Sensors-contd..
Advantages
• They can withstand, to some degree temperature fluctuations.
• They are fairly inexpensive.
• They can provide resolutions up to 500 dpi.
Disadvantages
• Size, the sensing plate must be of sufficient size to achieve a
quality image
• Residual prints from previous users can cause image degradation,
as severe latent prints can cause two sets of prints to be
superimposed.
• The coating and CCD arrays can wear with age, reducing accuracy.
• A large number of vendors of fingerprint sensing equipment are
gradually shifting towards silicon-based technology.
Silicon Based Sensors
• Silicon technology has gained considerable acceptance since its
introduction in the late 90's.
• Most silicon, or chip, technology is based on DC Capacitance, but
some also use AC Capacitance.
• The silicon sensor acts as one plate of a capacitor, and the finger is
the other.
• The capacitance between the sensing plate and the finger is
converted into an 8-bit grayscale digital image.
Silicon Based Sensors-contd..
• Fingerprint cards contain numerous capacitive plates which measure
the capacitance between the plates and the fingertip.
• When the finger is placed on the sensor extremely weak electrical
charges are created, building a pattern between the finger's ridges or
valleys and the sensor's plates.
• Using these charges the sensor measures the capacitance pattern
across the surface.
• The measured values are digitized by the sensor then sent to the
neighboring microprocessor.
• This can be done directly by applying an electrical charge to the
plate or by using electronic pulses passed to the fingertip.
Silicon Based Sensors-contd..
Advantages
• The Silicon chip comprises of about 200*200 lines on a wafer the size
of 1cm*1.5cm, thus providing a pretty good resolution for the image.
• Hence, Silicon generally produces better image quality, with less surface
area, than optical.
• Also, the reduced size of the chip means lower costs.
• Miniaturization of Silicon chips also makes it possible for the chips to
be integrated into numerous devices.
Disadvantages
• In spite of claims by manufacturers that Silicon is much more durable
than optical, Silicon's durability, especially in sub-optimal conditions,
has yet to be proven.
• Also, with the reduction in sensor size, it is even more important to
ensure that enrolment and verification are done carefully.
Ultrasound Sensors
• Ultrasound technology is perhaps the most accurate of the
fingerprint technologies.
• It uses transmitted ultrasound waves and measures the distance
based on the impedance of the finger, the plate, and air.
Ultrasound Sensors-contd..
Advantages
Ultrasound is capable of penetrating dirt and residue on the sensing plate
and the finger.
This overcomes the drawbacks of optical devices which can't make that
distinction.
It combines a strength of optical technology-large platen size and ease of
use, with a strength of silicon technology-the ability to overcome sub-
optimal reading conditions.
It is also virtually impossible to deceive an ultrasound system.
Disadvantages
The quality of the image depends to a great extent on the contact
between the finger and the sensor plate.
Scanner is large
Mechanical parts are quite expensive
Thermal Sensors
• Uses Pyro Electric material.
• Pyro-electric material is able to convert a difference in
temperature into a specific voltage.
• This effect is quite large, and is used in infrared
cameras.
• A thermal fingerprint sensor based on this material
measures the temperature difference between the sensor
pixels that are in contact with the ridges and those
under the valleys, that are not in contact.
Thermal Sensors-contd..
Advantages
• A strong immunity to electrostatic discharge
• Thermal imaging functions as well in extreme temperature conditions as
at room temperature.
• It is almost impossible to deceive with artificial fingertips.
Disadvantages
• A disadvantage of the thermal technique is that the image disappears
quickly.
• When a finger is placed on the sensor, initially there is a big difference in
temperature, and therefore a signal, but after a short period (less than a
tenth of a second), the image vanishes because the finger and the pixel
array have reached thermal equilibrium.
• However, this can be avoided by using a scanning method where the
finger is scanned across the sensor which is the same width as the image
to be obtained , but only a few pixels high.
22
Piezo- Electric sensors
Pressure sensitive sensors
Produce an electrical signal when mechanical stress is applied
to them
Sensor surface is made up of a non-conducting dielectric
material
Ridges and valleys are present at different distances from the
surface , they result in different amounts of current
24
Storing & Compressing fingerprint
images
Each fingerprint impression produces an image of 768 x 768
( when digitized at 500 dpi)
In AFIS applications, this needs more amount of memory
space to store these images
Neither lossless methods or JPEG compression techniques are
satisfactory
A new compression technique called Wavelet Scalar
Quantization (WSQ) is introduced to compress the images
25
WSQ
Based on Adaptive scalar quantization
Performs following steps
Fingerprint image is decomposed into a number of spatial
frequency sub-bands using a Discrete wavelet transform
the resulting DWT coefficients are quantized into discrete values
the quantized sub-bands are concatenated into several blocks and
compressed using an adaptive Huffman-run length encoding
A compressed image can be decoded into the original image by
applying steps in reverse order
WSQ compress a fingerprint image by a factor of 10 to 25.
Feature Enhancement
The first step is to obtain a clear image of the fingerprint.
Enhancement is carried out so as to improve the clarity of ridge and
furrow structures of input fingerprint images based on the estimated
local ridge orientation and frequency.
For grayscale images, areas lighter than a particular threshold are
discarded, and those darker are made black.
Original Enhanced
• Minutiae localization is the next step.
•Even a very precise image has distortions and false minutiae that need to be filtered out.
•Anomalies caused by scars, sweat, or dirt appear as false minutiae, and algorithms
locate any points or patterns that don't make sense, such as a spur on an island or a ridge
crossing perpendicular to 2-3 others (probably a scar or dirt).
•A large percentage of would-be minutiae are discarded in this process.
• The point at which a ridge ends, and the point where a bifurcation begins, are the
most rudimentary minutiae. Once the point has been situated, its location is commonly
indicated by the distance from the core, with the core serving as the 0,0 on an X,Y-axis.
In addition to the placement of the minutia, the angle of the minutia is normally used.
When a ridge ends, its direction at the point of termination establishes the angle. This
angle is taken from a horizontal line extending rightward from the core, and can be up to
359.
• In addition to using the location and angle of minutiae, some classify minutia by type
and quality. The advantage of this is that searches can be quicker, as a particularly
notable minutia may be distinctive enough to lead to a match. [6]
•The matching accuracy of a biometrics-based authentication system relies on the
stability of the biometric data associated with an individual over time.
•The biometric data acquired from an individual is susceptible to changes introduced
due to improper interaction with the sensor (e.g., partial fingerprints), modifications
in sensor characteristics (e.g., optical vs. solid-state fingerprint sensor), variations in
environmental factors (e.g.,dry weather resulting in faint fingerprints) and temporary
alterations in the biometric trait itself (e.g., cuts/scars on fingerprints).
•Thus, it is possible for the stored template data to be significantly different from those
obtained during authentication, resulting in an inferior performance (higher false
rejects) of the biometric system.
Variation in fingerprint exhibiting partial overlap.
•Multiple templates, that best represent the variability associated with a user's
biometric data, should be stored in the database. (E.g. One could store multiple
impressions pertaining to different portions of a user's fingerprint in order
to deal with the problem of partially overlapping fingerprints.)
• There is a tradeoff between the number of templates, and the storage and
computational overheads introduced by multiple templates.
•For an efficient functioning of a biometric system, this selection of templates
should be done automatically.
•There are two methods that are discussed in the literature. Please refer to
references for further details.
Template Selection-contd..
(Solutions to variations)
•Automatic Minutiae Detection: Minutiae are essentially terminations and
bifurcations of the ridge lines that constitute a fingerprint pattern.
•Automatic minutiae detection is an extremely critical process, especially in low-
quality fingerprints where noise and contrast deficiency can originate pixel
configurations similar to minutiae or hide real minutiae.
Algorithm:
•The basic idea here is to compare the minutiae on the
two images.
•The figure alongside is the input given to the system,
as can be seen from the figure the various details of
this image can be easily detected. Hence, we are in a
position to apply the AMD algorithm.
Algorithm (contd.)
• The next step in the algorithm is to
mark all the minutiae points on the
duplicate image of the input fingerprint
with the lines much clear after feature
extraction.
• Then this image is superimposed
onto the input image with marked
minutiae points as shown in the figure.
• Finally a comparison is made with the
images in the database and a
probabilistic result is given.
• It is difficult to extract the minutiae points accurately when the
fingerprint is of low quality.
•This method does not take into account the global pattern of
ridges and furrows.
• Fingerprint matching based on minutiae has problems in
matching different sized (unregistered) minutiae patterns.
Hardware Solution
•Temperature sensing, detection of pulsation on fingertip, pulse oximetry,
electrical conductivity, ECG, etc.
Software Solution (Research going on)
•Live fingers as opposed to spoofed fingers show some kind of moisture
pattern due to perspiration.
•The main idea behind this method is to take two prints after a time frame of
say 5 seconds and the algorithm makes a final decision based on the vitality
of the fingerprint.
•Banking Security - ATM security,card transaction
•Physical Access Control (e.g. Airport)
•Information System Security
•National ID Systems
•Passport control (INSPASS)
•Prisoner, prison visitors, inmate control
•Voting
•Identification of Criminals
•Identification of missing children
•Secure E-Commerce (Still under research)
Latest Technologies
3-D fingerprint
A new generation of touchless live scan devices that generate
a 3D representation of fingerprints is appearing.
Several images of the finger are acquired from different views
using a multicamera system, and a contact-free 3D
representation of the fingerprint is constructed.
This new sensing technology overcomes some of the
problems that intrinsically appear in contact-based sensors
such as improper finger placement, skin deformation, sensor
noise or dirt.
1) Biometric systems lab - http://bias.csr.unibo.it/research/biolab/bio_tree.html
2) Biometrica - http://www.biometrika.it/eng/wp_fx3.html
3) International Biometric Group – http://www.biometricgroup.com/reports/public/ reports/finger-scan_extraction.html
4) Dr. Dirk Scheuermann - “http://www.darmstadt.gmd.de/~scheuerm/lexikon/vlta_eng.html”
5) Handbook of fingerprint recognition - D. Maltoni, D. Maio, A. K. Jain, S. Prabahakar - Springer – 2003
6) BiometricsInfo.org - http://www.biometricsinfo.org/fingerprintrecognition.htm
7) “Issues for liveliness detection in Biometrics” - Stephanie Schuckers, Larry Hornak,Tim Norman, Reza Derakhshani,
Sujan Parthasaradhi
8) “Overview of Biometrics & Fingerprint Technology” - Dr. Y.S. Moon
9) “Biometric Template Selection: A Case Study in Fingerprints” - Anil Jain, Umut Uludag and Arun Ross
http://biometrics.cse.msu.edu/JainUludagRoss_AVBPA_03.pdf
10) Fingerprint Registry Service - http://www.lockheedmartin.com/lmis/level4/frs.html
11) Rideology and Poroscopy - http://www.eneate.freeserve.co.uk/thirdlevel.PDF
12) Multibiometric Systems - Anil K. Jain and Arun Ross
http://biometrics.cse.msu.edu/RossMultibiometric_CACM04.pdf111
POW
ERED
BY:-

Contenu connexe

Tendances

Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To BiometricsAbdul Rehman
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Pavan Kumar MT
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptMukta Gupta
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense TechnologyNavin Kumar
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPTVishnu Mysterio
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 

Tendances (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPT
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 

En vedette

Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identificationguest8cbcb02
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Sandeep Kumar Panda
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Fingerprint classification rules
Fingerprint classification rulesFingerprint classification rules
Fingerprint classification rulesKUL2700
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
fingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICfingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICKUL2700
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
Fingerprint based security system
Fingerprint based security systemFingerprint based security system
Fingerprint based security systemPadmakar Mangrule
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-pptMohankumar Ramachandran
 
Fingerprint Classification- Loop Patterns
Fingerprint Classification- Loop PatternsFingerprint Classification- Loop Patterns
Fingerprint Classification- Loop PatternsJury Rocamora
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction systemsagar solanky
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security systempraful borad
 

En vedette (20)

Fingerprint
FingerprintFingerprint
Fingerprint
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)
 
Fingerprint Pattern
Fingerprint PatternFingerprint Pattern
Fingerprint Pattern
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Finger reader
Finger readerFinger reader
Finger reader
 
Fingerprint classification rules
Fingerprint classification rulesFingerprint classification rules
Fingerprint classification rules
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
fingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICfingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCIC
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Fingerprint based security system
Fingerprint based security systemFingerprint based security system
Fingerprint based security system
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-ppt
 
finger print based security system
finger print based security systemfinger print based security system
finger print based security system
 
Fingerprint Classification- Loop Patterns
Fingerprint Classification- Loop PatternsFingerprint Classification- Loop Patterns
Fingerprint Classification- Loop Patterns
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Ridge counting-and-tracing
Ridge counting-and-tracingRidge counting-and-tracing
Ridge counting-and-tracing
 

Similaire à Fingerprint Recognition Technology Presentation (FRT

Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint RecognitionMirza Baig
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionMirza Baig
 
Dental digital radiography
Dental digital radiographyDental digital radiography
Dental digital radiographyhasan al ameeri
 
pachymetry confocal microscopy cornea ophthalmology diagnostics
pachymetry confocal microscopy cornea ophthalmology diagnosticspachymetry confocal microscopy cornea ophthalmology diagnostics
pachymetry confocal microscopy cornea ophthalmology diagnosticsPaavan Kalra
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
Chapter 25: Digital Imaging
Chapter 25: Digital ImagingChapter 25: Digital Imaging
Chapter 25: Digital ImagingKatieHenkel1
 
Raida iii /certified fixed orthodontic courses by Indian dental academy
Raida iii /certified fixed orthodontic courses by Indian dental academy Raida iii /certified fixed orthodontic courses by Indian dental academy
Raida iii /certified fixed orthodontic courses by Indian dental academy Indian dental academy
 
Raida iii /certified fixed orthodontic courses by Indian dental academy
Raida iii /certified fixed orthodontic courses by Indian dental academy Raida iii /certified fixed orthodontic courses by Indian dental academy
Raida iii /certified fixed orthodontic courses by Indian dental academy Indian dental academy
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners works1180002
 
A SCAN, B SCAN & BIOMETRY---19.pptx
A SCAN, B SCAN & BIOMETRY---19.pptxA SCAN, B SCAN & BIOMETRY---19.pptx
A SCAN, B SCAN & BIOMETRY---19.pptxLavanyaMadabushi
 

Similaire à Fingerprint Recognition Technology Presentation (FRT (20)

Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint Recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
DIGITAL IMAGING
DIGITAL IMAGINGDIGITAL IMAGING
DIGITAL IMAGING
 
Seminar
SeminarSeminar
Seminar
 
Slidedayo
SlidedayoSlidedayo
Slidedayo
 
Dental digital radiography
Dental digital radiographyDental digital radiography
Dental digital radiography
 
Cbct
CbctCbct
Cbct
 
Digital imaging
Digital imagingDigital imaging
Digital imaging
 
pachymetry confocal microscopy cornea ophthalmology diagnostics
pachymetry confocal microscopy cornea ophthalmology diagnosticspachymetry confocal microscopy cornea ophthalmology diagnostics
pachymetry confocal microscopy cornea ophthalmology diagnostics
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Cbct
CbctCbct
Cbct
 
Chapter 25: Digital Imaging
Chapter 25: Digital ImagingChapter 25: Digital Imaging
Chapter 25: Digital Imaging
 
UNIT-V.pptx
UNIT-V.pptxUNIT-V.pptx
UNIT-V.pptx
 
Raida iii /certified fixed orthodontic courses by Indian dental academy
Raida iii /certified fixed orthodontic courses by Indian dental academy Raida iii /certified fixed orthodontic courses by Indian dental academy
Raida iii /certified fixed orthodontic courses by Indian dental academy
 
Raida iii /certified fixed orthodontic courses by Indian dental academy
Raida iii /certified fixed orthodontic courses by Indian dental academy Raida iii /certified fixed orthodontic courses by Indian dental academy
Raida iii /certified fixed orthodontic courses by Indian dental academy
 
MM-UNIT-V.pptx
MM-UNIT-V.pptxMM-UNIT-V.pptx
MM-UNIT-V.pptx
 
ENDOVISION IN LAPAROSCOPY PPT. DR SREEJOY PATNAIK
ENDOVISION IN LAPAROSCOPY PPT.  DR SREEJOY PATNAIKENDOVISION IN LAPAROSCOPY PPT.  DR SREEJOY PATNAIK
ENDOVISION IN LAPAROSCOPY PPT. DR SREEJOY PATNAIK
 
digital imaging ppt.ppt
digital imaging ppt.pptdigital imaging ppt.ppt
digital imaging ppt.ppt
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
A SCAN, B SCAN & BIOMETRY---19.pptx
A SCAN, B SCAN & BIOMETRY---19.pptxA SCAN, B SCAN & BIOMETRY---19.pptx
A SCAN, B SCAN & BIOMETRY---19.pptx
 

Dernier

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Dernier (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Fingerprint Recognition Technology Presentation (FRT

  • 2. Introduction:  Definition of Biometrics:- “Automated methods of recognizing a person based on a physiological or behavioral characteristics”. “ The technology used for identification of a user based on a physical or behavioral characteristic, such as a fingerprint, iris, face, voice or handwriting is called Biometrics”.
  • 3. 3 History of fingerprints Human fingerprints have been discovered on a large number of archaeological artifacts and historical items In 1684, the English plant morphologist, Nehemiah Grew, published the first scientific paper reporting his systematic study on the ridge, furrow, and pore structure In 1788, a detailed description of the anatomical formations of fingerprints was made by Mayer. In 1823, Purkinji proposed the first fingerprint classification, which classified into nine categories In 1975, The FBI funded the development of fingerprint scanners
  • 4. Why FINGER PRINT? Oldest form of Biometrics High Reliablity Uses distinctive features of fingers
  • 6. 6 Fingerprint sensing Based on the mode of acquisition, a fingerprint image is classified as Off line image Live-scan image There are a number of live-scan sensing mechanisms that can detect the ridges and valleys present in the fingertip Examples are Optical FTIR Capacitive Pressure-based Ultrasound
  • 7. • classification is necessary to reduce the search time and computational complexity. • The FBI database has 70 million fingerprints. Fingerprint Classification Right Loop WhorlArch
  • 8. 8 The general structure of fingerprint scanner
  • 9. Devices Optical fingerprint sensor FIU-001/500 by SONY Electro-optical sensor [DELSY® CMOS sensor modul] Capacitive sensor [FingerTIP™ by Infineon] [ID Mouse by Siemens] Keyboard [G 81-12000 by Cherry]
  • 10. 10
  • 11. Fingerprint Sensors Optical Silicon Based Capacitive Sensors Ultrasound Thermal Pyroelectric Piezo-electric
  • 12. Parameters characterizing a fingerprint device are  Resolution  Area  Number of pixels  Geometric Accuracy  Image Quality  Interface  Frames per second  Automatic finger detection  Encryption  Supported operating systems
  • 13. Optical Sensors Oldest and most widely used technology. Majority of companies use optical technology. The finger is placed on a coated hard plastic plate. In most devices, a charged coupled device (CCD) converts the image of the fingerprint, with dark ridges and light valleys, into a digital signal. The brightness is either adjusted automatically or manually, leading to a usable image.
  • 14. Optical Sensors-contd.. Advantages • They can withstand, to some degree temperature fluctuations. • They are fairly inexpensive. • They can provide resolutions up to 500 dpi. Disadvantages • Size, the sensing plate must be of sufficient size to achieve a quality image • Residual prints from previous users can cause image degradation, as severe latent prints can cause two sets of prints to be superimposed. • The coating and CCD arrays can wear with age, reducing accuracy. • A large number of vendors of fingerprint sensing equipment are gradually shifting towards silicon-based technology.
  • 15. Silicon Based Sensors • Silicon technology has gained considerable acceptance since its introduction in the late 90's. • Most silicon, or chip, technology is based on DC Capacitance, but some also use AC Capacitance. • The silicon sensor acts as one plate of a capacitor, and the finger is the other. • The capacitance between the sensing plate and the finger is converted into an 8-bit grayscale digital image.
  • 16. Silicon Based Sensors-contd.. • Fingerprint cards contain numerous capacitive plates which measure the capacitance between the plates and the fingertip. • When the finger is placed on the sensor extremely weak electrical charges are created, building a pattern between the finger's ridges or valleys and the sensor's plates. • Using these charges the sensor measures the capacitance pattern across the surface. • The measured values are digitized by the sensor then sent to the neighboring microprocessor. • This can be done directly by applying an electrical charge to the plate or by using electronic pulses passed to the fingertip.
  • 17. Silicon Based Sensors-contd.. Advantages • The Silicon chip comprises of about 200*200 lines on a wafer the size of 1cm*1.5cm, thus providing a pretty good resolution for the image. • Hence, Silicon generally produces better image quality, with less surface area, than optical. • Also, the reduced size of the chip means lower costs. • Miniaturization of Silicon chips also makes it possible for the chips to be integrated into numerous devices. Disadvantages • In spite of claims by manufacturers that Silicon is much more durable than optical, Silicon's durability, especially in sub-optimal conditions, has yet to be proven. • Also, with the reduction in sensor size, it is even more important to ensure that enrolment and verification are done carefully.
  • 18. Ultrasound Sensors • Ultrasound technology is perhaps the most accurate of the fingerprint technologies. • It uses transmitted ultrasound waves and measures the distance based on the impedance of the finger, the plate, and air.
  • 19. Ultrasound Sensors-contd.. Advantages Ultrasound is capable of penetrating dirt and residue on the sensing plate and the finger. This overcomes the drawbacks of optical devices which can't make that distinction. It combines a strength of optical technology-large platen size and ease of use, with a strength of silicon technology-the ability to overcome sub- optimal reading conditions. It is also virtually impossible to deceive an ultrasound system. Disadvantages The quality of the image depends to a great extent on the contact between the finger and the sensor plate. Scanner is large Mechanical parts are quite expensive
  • 20. Thermal Sensors • Uses Pyro Electric material. • Pyro-electric material is able to convert a difference in temperature into a specific voltage. • This effect is quite large, and is used in infrared cameras. • A thermal fingerprint sensor based on this material measures the temperature difference between the sensor pixels that are in contact with the ridges and those under the valleys, that are not in contact.
  • 21. Thermal Sensors-contd.. Advantages • A strong immunity to electrostatic discharge • Thermal imaging functions as well in extreme temperature conditions as at room temperature. • It is almost impossible to deceive with artificial fingertips. Disadvantages • A disadvantage of the thermal technique is that the image disappears quickly. • When a finger is placed on the sensor, initially there is a big difference in temperature, and therefore a signal, but after a short period (less than a tenth of a second), the image vanishes because the finger and the pixel array have reached thermal equilibrium. • However, this can be avoided by using a scanning method where the finger is scanned across the sensor which is the same width as the image to be obtained , but only a few pixels high.
  • 22. 22 Piezo- Electric sensors Pressure sensitive sensors Produce an electrical signal when mechanical stress is applied to them Sensor surface is made up of a non-conducting dielectric material Ridges and valleys are present at different distances from the surface , they result in different amounts of current
  • 23.
  • 24. 24 Storing & Compressing fingerprint images Each fingerprint impression produces an image of 768 x 768 ( when digitized at 500 dpi) In AFIS applications, this needs more amount of memory space to store these images Neither lossless methods or JPEG compression techniques are satisfactory A new compression technique called Wavelet Scalar Quantization (WSQ) is introduced to compress the images
  • 25. 25 WSQ Based on Adaptive scalar quantization Performs following steps Fingerprint image is decomposed into a number of spatial frequency sub-bands using a Discrete wavelet transform the resulting DWT coefficients are quantized into discrete values the quantized sub-bands are concatenated into several blocks and compressed using an adaptive Huffman-run length encoding A compressed image can be decoded into the original image by applying steps in reverse order WSQ compress a fingerprint image by a factor of 10 to 25.
  • 26. Feature Enhancement The first step is to obtain a clear image of the fingerprint. Enhancement is carried out so as to improve the clarity of ridge and furrow structures of input fingerprint images based on the estimated local ridge orientation and frequency. For grayscale images, areas lighter than a particular threshold are discarded, and those darker are made black. Original Enhanced
  • 27. • Minutiae localization is the next step. •Even a very precise image has distortions and false minutiae that need to be filtered out. •Anomalies caused by scars, sweat, or dirt appear as false minutiae, and algorithms locate any points or patterns that don't make sense, such as a spur on an island or a ridge crossing perpendicular to 2-3 others (probably a scar or dirt). •A large percentage of would-be minutiae are discarded in this process. • The point at which a ridge ends, and the point where a bifurcation begins, are the most rudimentary minutiae. Once the point has been situated, its location is commonly indicated by the distance from the core, with the core serving as the 0,0 on an X,Y-axis. In addition to the placement of the minutia, the angle of the minutia is normally used. When a ridge ends, its direction at the point of termination establishes the angle. This angle is taken from a horizontal line extending rightward from the core, and can be up to 359. • In addition to using the location and angle of minutiae, some classify minutia by type and quality. The advantage of this is that searches can be quicker, as a particularly notable minutia may be distinctive enough to lead to a match. [6]
  • 28. •The matching accuracy of a biometrics-based authentication system relies on the stability of the biometric data associated with an individual over time. •The biometric data acquired from an individual is susceptible to changes introduced due to improper interaction with the sensor (e.g., partial fingerprints), modifications in sensor characteristics (e.g., optical vs. solid-state fingerprint sensor), variations in environmental factors (e.g.,dry weather resulting in faint fingerprints) and temporary alterations in the biometric trait itself (e.g., cuts/scars on fingerprints). •Thus, it is possible for the stored template data to be significantly different from those obtained during authentication, resulting in an inferior performance (higher false rejects) of the biometric system. Variation in fingerprint exhibiting partial overlap.
  • 29. •Multiple templates, that best represent the variability associated with a user's biometric data, should be stored in the database. (E.g. One could store multiple impressions pertaining to different portions of a user's fingerprint in order to deal with the problem of partially overlapping fingerprints.) • There is a tradeoff between the number of templates, and the storage and computational overheads introduced by multiple templates. •For an efficient functioning of a biometric system, this selection of templates should be done automatically. •There are two methods that are discussed in the literature. Please refer to references for further details. Template Selection-contd.. (Solutions to variations)
  • 30. •Automatic Minutiae Detection: Minutiae are essentially terminations and bifurcations of the ridge lines that constitute a fingerprint pattern. •Automatic minutiae detection is an extremely critical process, especially in low- quality fingerprints where noise and contrast deficiency can originate pixel configurations similar to minutiae or hide real minutiae. Algorithm: •The basic idea here is to compare the minutiae on the two images. •The figure alongside is the input given to the system, as can be seen from the figure the various details of this image can be easily detected. Hence, we are in a position to apply the AMD algorithm.
  • 31. Algorithm (contd.) • The next step in the algorithm is to mark all the minutiae points on the duplicate image of the input fingerprint with the lines much clear after feature extraction. • Then this image is superimposed onto the input image with marked minutiae points as shown in the figure. • Finally a comparison is made with the images in the database and a probabilistic result is given.
  • 32. • It is difficult to extract the minutiae points accurately when the fingerprint is of low quality. •This method does not take into account the global pattern of ridges and furrows. • Fingerprint matching based on minutiae has problems in matching different sized (unregistered) minutiae patterns.
  • 33. Hardware Solution •Temperature sensing, detection of pulsation on fingertip, pulse oximetry, electrical conductivity, ECG, etc. Software Solution (Research going on) •Live fingers as opposed to spoofed fingers show some kind of moisture pattern due to perspiration. •The main idea behind this method is to take two prints after a time frame of say 5 seconds and the algorithm makes a final decision based on the vitality of the fingerprint.
  • 34. •Banking Security - ATM security,card transaction •Physical Access Control (e.g. Airport) •Information System Security •National ID Systems •Passport control (INSPASS) •Prisoner, prison visitors, inmate control •Voting •Identification of Criminals •Identification of missing children •Secure E-Commerce (Still under research)
  • 35. Latest Technologies 3-D fingerprint A new generation of touchless live scan devices that generate a 3D representation of fingerprints is appearing. Several images of the finger are acquired from different views using a multicamera system, and a contact-free 3D representation of the fingerprint is constructed. This new sensing technology overcomes some of the problems that intrinsically appear in contact-based sensors such as improper finger placement, skin deformation, sensor noise or dirt.
  • 36. 1) Biometric systems lab - http://bias.csr.unibo.it/research/biolab/bio_tree.html 2) Biometrica - http://www.biometrika.it/eng/wp_fx3.html 3) International Biometric Group – http://www.biometricgroup.com/reports/public/ reports/finger-scan_extraction.html 4) Dr. Dirk Scheuermann - “http://www.darmstadt.gmd.de/~scheuerm/lexikon/vlta_eng.html” 5) Handbook of fingerprint recognition - D. Maltoni, D. Maio, A. K. Jain, S. Prabahakar - Springer – 2003 6) BiometricsInfo.org - http://www.biometricsinfo.org/fingerprintrecognition.htm 7) “Issues for liveliness detection in Biometrics” - Stephanie Schuckers, Larry Hornak,Tim Norman, Reza Derakhshani, Sujan Parthasaradhi 8) “Overview of Biometrics & Fingerprint Technology” - Dr. Y.S. Moon 9) “Biometric Template Selection: A Case Study in Fingerprints” - Anil Jain, Umut Uludag and Arun Ross http://biometrics.cse.msu.edu/JainUludagRoss_AVBPA_03.pdf 10) Fingerprint Registry Service - http://www.lockheedmartin.com/lmis/level4/frs.html 11) Rideology and Poroscopy - http://www.eneate.freeserve.co.uk/thirdlevel.PDF 12) Multibiometric Systems - Anil K. Jain and Arun Ross http://biometrics.cse.msu.edu/RossMultibiometric_CACM04.pdf111

Notes de l'éditeur

  1. What is pulse oximetry?