SlideShare a Scribd company logo
1 of 6
Download to read offline
How Fingerprint Scanners Work

 Introduction to How Fingerprint Scanners Work

Computerized fingerprint scanners were pretty exotic
 technology in the real world for recently.In the past few
 years, however, scanners have started popping up all over
 the place -- in police stations, high-security buildings and
 even on PC keyboards, and cellphones.
We'll also see how fingerprint scanner security systems
 stack up to conventional password and identity card
 systems, and find out how they can fail.
Fingerprint Basics

Fingerprints are one of those bizarre twists of nature.
 Human beings happen to have built-in, easily
 accessible identity cards.

The other function of fingerprints is a total coincidence.
 Like everything in the human body, these ridges form
 through a combination of genetic and environmental
 factors. The genetic code in DNA gives general orders
 on the way skin should form in a developing fetus, but
 the specific way it forms is a result of random events.
Fingerprint Basics 2

fingerprints are a unique marker for a person, even an
  identical twin. And while two prints may look basically
  the same at a glance, a trained investigator or an
  advanced piece of software can pick out clear, defined
  differences.

This is the basic idea of fingerprint analysis, in both
 crime investigation and security. A fingerprint
 scanner's job is to take the place of a human analyst
 by collecting a print sample and comparing it to other
 samples on record. In the next few sections, we'll find
 out how scanners do this.
Optical Scanner
A fingerprint scanner system has two basic jobs, and it needs to
 determine whether the pattern of ridges and valleys in this
 image matches the pattern of ridges and valleys in pre-scanned
 images.

There are a number of different ways to get an image of
 somebody's finger. The most common methods today are
 optical scanning and capacitance scanning. Both types come
 up with the same sort of image, but they go about it in
 completely different ways.

The heart of an optical scanner is a charge coupled device
 (CCD), the same light sensor system used in digital cameras
 and camcorders. A CCD is simply an array of light-sensitive
 diodes called photosites.
Capacitance Scanner

The scanner processor reads this voltage output and determines
whether it is characteristic of a ridge or a valley. By reading every
cell in the sensor array, the processor can put together an overall
picture of the fingerprint, similar to the image captured by an
optical scanner.

The main advantage of a capacitive scanner is that it requires a
real fingerprint-type shape, rather than the pattern of light and dark
that makes up the visual impression of a fingerprint. This makes
the system harder to trick. Additionally, since they use a
semiconductor chip rather than a CCD unit, capacitive scanners
tend to be more compact that optical devices.
Analysis

The scanner system software uses highly complex
algorithms to recognize and analyze these minutiae. The
basic idea is to measure the relative positions of
minutiae, in the same sort of way you might recognize a
part of the sky by the relative positions of stars. A simple
way to think of it is to consider the shapes that various
minutia form when you draw straight lines between them.
If two prints have three ridge endings and two
bifurcations, forming the same shape with the same
dimensions, there's a high likelihood they're from the
same print.

More Related Content

What's hot

How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
Shota Suzuki
 
Sensors On 3d Digitization
Sensors On 3d DigitizationSensors On 3d Digitization
Sensors On 3d Digitization
Rajan Kumar
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 
Sw2 week12
Sw2 week12Sw2 week12
Sw2 week12
gomen
 
Technological advancements in sci vis
Technological advancements in sci visTechnological advancements in sci vis
Technological advancements in sci vis
Charles Flynt
 

What's hot (18)

Kadai2
Kadai2Kadai2
Kadai2
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Sensors On 3d Digitization
Sensors On 3d DigitizationSensors On 3d Digitization
Sensors On 3d Digitization
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
roy 12 B
 roy 12 B roy 12 B
roy 12 B
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
assignment
assignmentassignment
assignment
 
Scanner
ScannerScanner
Scanner
 
week12
week12week12
week12
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
3 d scanning technology
3 d scanning technology3 d scanning technology
3 d scanning technology
 
input devices By ZAK
input devices By ZAKinput devices By ZAK
input devices By ZAK
 
Sw2 week12
Sw2 week12Sw2 week12
Sw2 week12
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognition
 
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
 
Natural Hand Gestures Recognition System for Intelligent HCI: A Survey
Natural Hand Gestures Recognition System for Intelligent HCI: A SurveyNatural Hand Gestures Recognition System for Intelligent HCI: A Survey
Natural Hand Gestures Recognition System for Intelligent HCI: A Survey
 
Technological advancements in sci vis
Technological advancements in sci visTechnological advancements in sci vis
Technological advancements in sci vis
 

Similar to Week12

Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
Haruki0428
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
guest13f6ca
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
s1180002
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
s1190106
 
Group Slide Presentation: Week 12
Group Slide Presentation: Week 12Group Slide Presentation: Week 12
Group Slide Presentation: Week 12
motoki_guransahal
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
Anzu Nakada
 
Assig b w12p1
Assig b w12p1Assig b w12p1
Assig b w12p1
Haruqa01
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
oceanflying
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
oceanflying
 

Similar to Week12 (20)

Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Ex12
Ex12Ex12
Ex12
 
Week12group
Week12groupWeek12group
Week12group
 
Sw week12
Sw week12Sw week12
Sw week12
 
How fingerprint scanners work
How fingerprint scanners workHow fingerprint scanners work
How fingerprint scanners work
 
Prezen3
Prezen3Prezen3
Prezen3
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Group Slide Presentation: Week 12
Group Slide Presentation: Week 12Group Slide Presentation: Week 12
Group Slide Presentation: Week 12
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Assig b w12p1
Assig b w12p1Assig b w12p1
Assig b w12p1
 
2
22
2
 
Roy
RoyRoy
Roy
 
How Fingerprint Scanners Work
How  Fingerprint  Scanners  WorkHow  Fingerprint  Scanners  Work
How Fingerprint Scanners Work
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 
Eigo1 1
Eigo1 1Eigo1 1
Eigo1 1
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
assignment
assignmentassignment
assignment
 

More from s1170005 (15)

Final pre 6
Final pre 6Final pre 6
Final pre 6
 
Final pre 5
Final pre 5Final pre 5
Final pre 5
 
Dell
DellDell
Dell
 
Sakura
SakuraSakura
Sakura
 
Week3
Week3Week3
Week3
 
Week4
Week4Week4
Week4
 
IBM Reseach website
IBM Reseach websiteIBM Reseach website
IBM Reseach website
 
Week3
Week3Week3
Week3
 
Week3
Week3Week3
Week3
 
Week 13 Slide
Week 13 SlideWeek 13 Slide
Week 13 Slide
 
Week 13 Slide
Week 13 SlideWeek 13 Slide
Week 13 Slide
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
How Rss Works
How Rss WorksHow Rss Works
How Rss Works
 
Week11
Week11Week11
Week11
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Week12

  • 1. How Fingerprint Scanners Work Introduction to How Fingerprint Scanners Work Computerized fingerprint scanners were pretty exotic technology in the real world for recently.In the past few years, however, scanners have started popping up all over the place -- in police stations, high-security buildings and even on PC keyboards, and cellphones. We'll also see how fingerprint scanner security systems stack up to conventional password and identity card systems, and find out how they can fail.
  • 2. Fingerprint Basics Fingerprints are one of those bizarre twists of nature. Human beings happen to have built-in, easily accessible identity cards. The other function of fingerprints is a total coincidence. Like everything in the human body, these ridges form through a combination of genetic and environmental factors. The genetic code in DNA gives general orders on the way skin should form in a developing fetus, but the specific way it forms is a result of random events.
  • 3. Fingerprint Basics 2 fingerprints are a unique marker for a person, even an identical twin. And while two prints may look basically the same at a glance, a trained investigator or an advanced piece of software can pick out clear, defined differences. This is the basic idea of fingerprint analysis, in both crime investigation and security. A fingerprint scanner's job is to take the place of a human analyst by collecting a print sample and comparing it to other samples on record. In the next few sections, we'll find out how scanners do this.
  • 4. Optical Scanner A fingerprint scanner system has two basic jobs, and it needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images. There are a number of different ways to get an image of somebody's finger. The most common methods today are optical scanning and capacitance scanning. Both types come up with the same sort of image, but they go about it in completely different ways. The heart of an optical scanner is a charge coupled device (CCD), the same light sensor system used in digital cameras and camcorders. A CCD is simply an array of light-sensitive diodes called photosites.
  • 5. Capacitance Scanner The scanner processor reads this voltage output and determines whether it is characteristic of a ridge or a valley. By reading every cell in the sensor array, the processor can put together an overall picture of the fingerprint, similar to the image captured by an optical scanner. The main advantage of a capacitive scanner is that it requires a real fingerprint-type shape, rather than the pattern of light and dark that makes up the visual impression of a fingerprint. This makes the system harder to trick. Additionally, since they use a semiconductor chip rather than a CCD unit, capacitive scanners tend to be more compact that optical devices.
  • 6. Analysis The scanner system software uses highly complex algorithms to recognize and analyze these minutiae. The basic idea is to measure the relative positions of minutiae, in the same sort of way you might recognize a part of the sky by the relative positions of stars. A simple way to think of it is to consider the shapes that various minutia form when you draw straight lines between them. If two prints have three ridge endings and two bifurcations, forming the same shape with the same dimensions, there's a high likelihood they're from the same print.