SlideShare a Scribd company logo
1 of 15
FINGERPRINT:FINGER BIOMETRICS
by Rajasekaran.T
INTRODUCTION
 Fingerprinting was first created by Dr.
Henry Fault, a British surgeon in 1882.
 It based on “KEY”.
Fingerprint Patterns
 Arch- The ridges enter from one side of the finger, rise in
the centre forming an arc, and then exit the other side of the
finger.
 Loop-The ridges enter from one side of a finger, form a
curve, and then exit on that same side.
 Whorl-Ridges form circularly around a central point on
the finger.
Arch Loop Whorl
Sales
Loop
whorl
Arch
The human population has fingerprints in the following
percentages:
Loop – 65%
Whorl -- 30%
Arch -- 5%
population
Loop
Whorl
Arch
Whorl
1.Double Loop
Whorl.
2.Plan whorl.
3.Central.
pocket Loop whorl.
4.Accidental whorl.
Loop
1.Uinar Loop.
2.Radial Loop.
Arch
1.Plain Arch.
2.Tented Arch.
Different Identification on Fingerprint
Crossover: two ridges cross
each other
Core: centre
Bifurcation: ridge separates
Ridge ending: end point
Island: small ridge b/w two
spaces
Delta: space between ridges
Pore: human pore
Bifurcation Bridge Dot Double bifurcation
Opposed
bifurcation
Island (short
ridge)
Hook (spur) Lake (enclosure)
Ridge crossing Ridge ending Trifurcation
Opposed
bifurcation/ridge
ending)
Fingerprint matching techniques
There are two categories of fingerprint matching techniques:
1. minutiae-based .
2. correlation based.
 Minutiae-based techniques first find minutiae points and then
map their relative placement on the finger.
 The correlation-based method is able to overcome some of the
difficulties of the minutiae-based approach.
Two main technologies used to capture image of the fingerprint
Optical sensor – use light refracted through a prism. An optical sensor
based reader uses light to read and acquire fingerprint images. Optical
sensors can be affected by a number of real life factors such as stray
light, surface contamination or even prior fingerprint impressions
present on the sensor surface. Hence it is essential to clean the
fingerprint reader glass on a regular basis for optimal performance.
Capacitive sensor – detect voltage changes in skin between ridges and
valleys. Capacitive sensors use electric current to sense a fingerprint
and capture the image. As sensors apply a small voltage to the finger, a
real fingerprint is required rather than a visual impression of it. This
technique makes the fingerprint reader more reliable as it becomes
harder to fake enrolment.
Image Processing
Capture the fingerprint images and process them through a series of
image processing algorithms to obtain a clear unambiguous skeletal
image of the original gray tone impression, clarifying smudged
areas, removing extraneous artifacts and healing most scars, cuts and
breaks.
Bio-Link SDK
Advantage of Fingerprint:
a. Very high accuracy.
b. Is the most economical biometric PC user authentication technique.
c. Easy to use.
d. Small storage space required for the biometric template, reducing the
size of the database memory required
e. It is standardized.
Disadvantage of Fingerprint:
a. For some people it is very intrusive, because is still related to criminal
identification.
b. It can make mistakes with the dryness or dirty of the finger’s skin, as well
as with the age (is not appropriate with children, because the size of their
fingerprint changes quickly).
-THANK YOU-

More Related Content

What's hot

Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
Faimin Khan
 

What's hot (20)

Fingerprint Pattern
Fingerprint PatternFingerprint Pattern
Fingerprint Pattern
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patterns
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
 
Forensic analysis of foot wear impression
Forensic analysis of foot wear impressionForensic analysis of foot wear impression
Forensic analysis of foot wear impression
 
restoration of toolmarks
restoration of toolmarksrestoration of toolmarks
restoration of toolmarks
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fs Ch 7
Fs Ch 7Fs Ch 7
Fs Ch 7
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
conventional methods of fingerprint development
conventional methods of fingerprint developmentconventional methods of fingerprint development
conventional methods of fingerprint development
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Presentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemPresentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification System
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 

Similar to Fingerprint presentation

Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27
s1170050
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
oceanflying
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
oceanflying
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
s1180002
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
Haruki0428
 
How fingerprint Works
How fingerprint WorksHow fingerprint Works
How fingerprint Works
s1190017
 
SW2 s1190089person#2
SW2 s1190089person#2SW2 s1190089person#2
SW2 s1190089person#2
s1190089
 

Similar to Fingerprint presentation (20)

Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint Recognition
 
Slide3 12 27
Slide3 12 27Slide3 12 27
Slide3 12 27
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprints
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Slidedayo
SlidedayoSlidedayo
Slidedayo
 
Seminar
SeminarSeminar
Seminar
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
How fingerprint Works
How fingerprint WorksHow fingerprint Works
How fingerprint Works
 
SW2 s1190089person#2
SW2 s1190089person#2SW2 s1190089person#2
SW2 s1190089person#2
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
If2615981604
If2615981604If2615981604
If2615981604
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Fingerprint presentation

  • 2. INTRODUCTION  Fingerprinting was first created by Dr. Henry Fault, a British surgeon in 1882.  It based on “KEY”.
  • 3. Fingerprint Patterns  Arch- The ridges enter from one side of the finger, rise in the centre forming an arc, and then exit the other side of the finger.  Loop-The ridges enter from one side of a finger, form a curve, and then exit on that same side.  Whorl-Ridges form circularly around a central point on the finger. Arch Loop Whorl
  • 4. Sales Loop whorl Arch The human population has fingerprints in the following percentages: Loop – 65% Whorl -- 30% Arch -- 5% population Loop Whorl Arch
  • 5. Whorl 1.Double Loop Whorl. 2.Plan whorl. 3.Central. pocket Loop whorl. 4.Accidental whorl. Loop 1.Uinar Loop. 2.Radial Loop. Arch 1.Plain Arch. 2.Tented Arch.
  • 6. Different Identification on Fingerprint Crossover: two ridges cross each other Core: centre Bifurcation: ridge separates Ridge ending: end point Island: small ridge b/w two spaces Delta: space between ridges Pore: human pore
  • 7. Bifurcation Bridge Dot Double bifurcation Opposed bifurcation Island (short ridge) Hook (spur) Lake (enclosure) Ridge crossing Ridge ending Trifurcation Opposed bifurcation/ridge ending)
  • 8. Fingerprint matching techniques There are two categories of fingerprint matching techniques: 1. minutiae-based . 2. correlation based.  Minutiae-based techniques first find minutiae points and then map their relative placement on the finger.  The correlation-based method is able to overcome some of the difficulties of the minutiae-based approach.
  • 9. Two main technologies used to capture image of the fingerprint Optical sensor – use light refracted through a prism. An optical sensor based reader uses light to read and acquire fingerprint images. Optical sensors can be affected by a number of real life factors such as stray light, surface contamination or even prior fingerprint impressions present on the sensor surface. Hence it is essential to clean the fingerprint reader glass on a regular basis for optimal performance. Capacitive sensor – detect voltage changes in skin between ridges and valleys. Capacitive sensors use electric current to sense a fingerprint and capture the image. As sensors apply a small voltage to the finger, a real fingerprint is required rather than a visual impression of it. This technique makes the fingerprint reader more reliable as it becomes harder to fake enrolment.
  • 10. Image Processing Capture the fingerprint images and process them through a series of image processing algorithms to obtain a clear unambiguous skeletal image of the original gray tone impression, clarifying smudged areas, removing extraneous artifacts and healing most scars, cuts and breaks.
  • 11.
  • 12.
  • 14. Advantage of Fingerprint: a. Very high accuracy. b. Is the most economical biometric PC user authentication technique. c. Easy to use. d. Small storage space required for the biometric template, reducing the size of the database memory required e. It is standardized. Disadvantage of Fingerprint: a. For some people it is very intrusive, because is still related to criminal identification. b. It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly).