SlideShare une entreprise Scribd logo
1  sur  24
Fingerprint
• A fingerprint is a unique pattern of ridges and
valleys on the surface of a finger of an
individual. A ridge is defined as a single
curved segment, and a valley is the region
between two adjacent ridges.
Fingerprint Principles
According to criminal investigators, fingerprints follow
3 fundamental principles:
• A fingerprint is an individual characteristic; no two
people have been found with the exact same
fingerprint pattern.
• A fingerprint pattern will remain unchanged for the
life of an individual; however, the print itself may
change due to permanent scars and skin diseases.
• Fingerprints have general characteristic ridge
patterns that allow them to be systematically
identified.
Fingerprint Classes
There are 3 specific classes for all fingerprints based
upon their visual pattern: arches, loops, and whorls.
Each group is divided into smaller groups
as seen in the lists below.
Arch
Plain arch
Tented arch
Loop
Radial Loop
Ulnar loop
Whorl
Plain whorl
Central pocket whorl
Double loop whorl
Accidentical
Interesting Info
Fingerprint Factoid:
60% of people have loops, 35% have whorls,
and 5% have arches
Arches
Arches are the simplest type of fingerprints that are formed by
ridges that enter on one side of the print and exit on the other.
No deltas are present.
Plain Arch
Ridges enter on one side and
exit on the other side.
Tented Arches
Similar to the plain arch,
but has a spike in the center.
Spike or “tent”
Loops
Loops must have one delta and one or more ridges that enter and
leave on the same side. These patterns are named for their positions
related to the radius and ulna bones, i.e. the bone the loop opening is
facing towards.
Delta
L – Radial Loop
R - Ulnar Loop
L – Ulnar Loop
R - Radial Loop
Whorls
Whorls have at least one ridge that makes (or tends to make) a
complete circuit. They also have at least two deltas. If a print has
more than two deltas, it is most likely an accidental.
Draw a line between the two deltas in the plain and central pocket
whorls. If some of the curved ridges touch the line, it is a plain
whorl. If none of the center core touches the line, it is a central
pocket whorl.
Plain
Whorl
Central
Pocket
Whorl
Whorls
Accidental Whorl
Accidental whorls contain two
or more patterns (not
including the plain arch), or
does not clearly fall under any
of the other categories.
Double Loop Whorl
Double loop whorls are
made up of any two loops
combined into one print.
Delta
Delta
Fingerprint Features
1. Global Ridge Pattern
 A core is the uppermost of the innermost
curving ridge
 a delta point is the junction point where three
ridge flows meet
2. Local Ridge Pattern
• Local ridge details are the discontinuities of
local ridge structure referred to as minutiae
• A good quality image has around 40 to 100
minutiae
Bifurcation Bridge Dot Double bifurcation
Opposed
bifurcation
Island (short
ridge)
Hook (spur) Lake (enclosure)
Ridge crossing Ridge ending Trifurcation
Opposed
bifurcation/ridge
ending)
Fingerprint Recognition
• Fingerprint recognition (is referred as AFRS
(Automatic Fingerprint Recognition System)
• Fingerprint recognition is the process of
comparing questioned and known
fingerprint against another fingerprint to
determine if the impressions are from the
same finger
• It includes two sub-domains:
fingerprint verification (one to one matching) the
purpose of fingerprint verification is to verify the
identity of a person
fingerprint identification(one to many matching)
the goal of fingerprint identification is to
establish the identity of a person.
• Fingerprint recognition systems consist of the
following parts:
Image acquisition
Pre-processing
Feature extraction
Matching
Fingerprint Image Acquisition
• There are numbers of different techniques for
capturing a fingerprint image including optical,
capacitive, radio frequency, ultrasound, and
thermal methods.
• One common shortcoming of many conventional
fingerprint-sensing technologies is the frequent
occurrence of poor-quality images under a
variety of common operational circumstances.
• Bad-quality images mostly result in spurious
and missing features that then degrade the
performance of the systems depending on
these features. Hence, there is a need for a
good enhancement method applied on
fingerprint image to overcome these
problems
Pre-processing
1. Fingerprint image Binarization
• In Binarization, the grey scale image is
converted into binary image. Binary images are
easy to process. The basic principle of
converting an image into binary is to decide a
threshold value, and then the pixels whose value
are more than the threshold are converted to
white pixels, and the pixels whose value are
below or equal to the threshold value are
converted to black pixels.
2. Finger print Image enhancement
• The captured fingerprint image may contain
various noises, thus cause poor matching
result
• To remove noise, some enhancement
techniques are applied.
3. Fingerprint image segmentation
• the primary purpose of segmentation is to
avoid extraction of feature in the background
that is in reality considered as a noisy area
• Segmentation indicates the separation of
fingerprint area or foreground from the image
4. Fingerprint image thinning
• Thinning is to remove ridges edge pixels
from the binary fingerprint image, so that
only a single pixel describes the ridges, in
order to facilitate minutiae extraction.
Feature extraction &Matching
• these features are stored as template,
either to register new user, or to use it to
be compared with other fingerprint
template, stored in system database
important things
1- cost :- cost rang from $100 to $2000
2- Ease of use :- medium.
3- Authentication:-
Fingerprint recognition or fingerprint authentication refers
to the automated method of verifying a match between two
human fingerprint.
4- Identification :-
matching the characteristics of a fingerprint on file
to the one presented to system .
5- physiological and/or behavior characteristics :-
the fingerprint is physiological characteristics.
6- Ability to applied: This system can be applied, but needs to H/W
and S/W whenever the devices have high specifications like (optical fingerprint
scanner) with strong ways in determining the feature all that raise security and
reliability ,if the cost of the system is high has increased security If the low-cost
(the scanner for fingerprint) we can use more than one way such as palm and
voice, So we get a high security at low cost.
7- Community acceptance :- low .
8- Automatic (real time) :- the fingerprint system divided into
off-line in the (pre-processing ,feature extraction) part.
on-line in the ( image acquisition , matching) part.
It takes a few minutes 3-5 sec.
9-Life cycle:-
fingerprint pattern will remain unchanged for the life of
an individual.
10- maintenance requirement :-
no need to maintenance.
THANK YOU…
The END!

Contenu connexe

Tendances

Fundamentals of fingerprinting
Fundamentals of fingerprintingFundamentals of fingerprinting
Fundamentals of fingerprintingDakota Boswell
 
Crime scene sketching basics
Crime scene sketching basicsCrime scene sketching basics
Crime scene sketching basicsnruhland
 
Automated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsAutomated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsRmcauley
 
Comparison microscope
Comparison microscopeComparison microscope
Comparison microscopeKetan Patil
 
Portrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S ShaktawatPortrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S ShaktawatG.S Shaktawat
 
Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patternsBlancoScience
 
Fingerprint presentation...
Fingerprint presentation...Fingerprint presentation...
Fingerprint presentation...Stina14
 
Sample Sample Pattern Area training Module
Sample Sample  Pattern Area training ModuleSample Sample  Pattern Area training Module
Sample Sample Pattern Area training ModuleRmcauley
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand GeometryMazin Alwaaly
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identificationguest8cbcb02
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication systemMazin Alwaaly
 
alterations_oblitearations.pptx
alterations_oblitearations.pptxalterations_oblitearations.pptx
alterations_oblitearations.pptxPallaviKumari112
 
Poroscopy and edgeoscopy
Poroscopy and edgeoscopyPoroscopy and edgeoscopy
Poroscopy and edgeoscopykiran malik
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptMukta Gupta
 
Crime scene sketching basics
Crime scene sketching basicsCrime scene sketching basics
Crime scene sketching basicsnruhland
 

Tendances (20)

Fundamentals of fingerprinting
Fundamentals of fingerprintingFundamentals of fingerprinting
Fundamentals of fingerprinting
 
Crime scene sketching basics
Crime scene sketching basicsCrime scene sketching basics
Crime scene sketching basics
 
Automated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsAutomated Fingerprint Identification Systems
Automated Fingerprint Identification Systems
 
Comparison microscope
Comparison microscopeComparison microscope
Comparison microscope
 
Portrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S ShaktawatPortrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S Shaktawat
 
Fingerprint patterns
Fingerprint patternsFingerprint patterns
Fingerprint patterns
 
Fingerprint presentation...
Fingerprint presentation...Fingerprint presentation...
Fingerprint presentation...
 
fingerprint characteristics
fingerprint characteristicsfingerprint characteristics
fingerprint characteristics
 
Sample Sample Pattern Area training Module
Sample Sample  Pattern Area training ModuleSample Sample  Pattern Area training Module
Sample Sample Pattern Area training Module
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
FINGER_PRINT_HISTORY.ppt
FINGER_PRINT_HISTORY.pptFINGER_PRINT_HISTORY.ppt
FINGER_PRINT_HISTORY.ppt
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
alterations_oblitearations.pptx
alterations_oblitearations.pptxalterations_oblitearations.pptx
alterations_oblitearations.pptx
 
Poroscopy and edgeoscopy
Poroscopy and edgeoscopyPoroscopy and edgeoscopy
Poroscopy and edgeoscopy
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
 
Crime scene sketching basics
Crime scene sketching basicsCrime scene sketching basics
Crime scene sketching basics
 
Forensic photography
Forensic photographyForensic photography
Forensic photography
 

Similaire à Pattern recognition fingerprints

Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint RecognitionMirza Baig
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”Er. Arpit Sharma
 
Iris Recognition .pptx
Iris Recognition .pptxIris Recognition .pptx
Iris Recognition .pptxSOMESHJADHWANI
 
Finger print recognition technique using arduino uno
Finger print recognition technique using arduino unoFinger print recognition technique using arduino uno
Finger print recognition technique using arduino unoVibhuThakur3
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionMirza Baig
 
Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...
Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...
Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...IRJET Journal
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABAM Publications
 
How fingerprint Works
How fingerprint WorksHow fingerprint Works
How fingerprint Workss1190017
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
 

Similaire à Pattern recognition fingerprints (20)

Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint Recognition
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprints images
Fingerprints imagesFingerprints images
Fingerprints images
 
Seminar
SeminarSeminar
Seminar
 
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
 
Iris Recognition .pptx
Iris Recognition .pptxIris Recognition .pptx
Iris Recognition .pptx
 
Finger print recognition technique using arduino uno
Finger print recognition technique using arduino unoFinger print recognition technique using arduino uno
Finger print recognition technique using arduino uno
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...
Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...
Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
 
How fingerprint Works
How fingerprint WorksHow fingerprint Works
How fingerprint Works
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 

Plus de Mazin Alwaaly

Pattern recognition voice biometrics
Pattern recognition voice biometricsPattern recognition voice biometrics
Pattern recognition voice biometricsMazin Alwaaly
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signatureMazin Alwaaly
 
Pattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earPattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earMazin Alwaaly
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 
Pattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionPattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionMazin Alwaaly
 
Pattern recognition forensic dental identification
Pattern recognition forensic dental identificationPattern recognition forensic dental identification
Pattern recognition forensic dental identificationMazin Alwaaly
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometricMazin Alwaaly
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMazin Alwaaly
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
 
Multimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMultimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMazin Alwaaly
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithmsMazin Alwaaly
 
Multimedia lossless compression algorithms
Multimedia lossless compression algorithmsMultimedia lossless compression algorithms
Multimedia lossless compression algorithmsMazin Alwaaly
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniquesMazin Alwaaly
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standardsMazin Alwaaly
 
Multimedia fundamental concepts in video
Multimedia fundamental concepts in videoMultimedia fundamental concepts in video
Multimedia fundamental concepts in videoMazin Alwaaly
 
Multimedia color in image and video
Multimedia color in image and videoMultimedia color in image and video
Multimedia color in image and videoMazin Alwaaly
 
Multimedia graphics and image data representation
Multimedia graphics and image data representationMultimedia graphics and image data representation
Multimedia graphics and image data representationMazin Alwaaly
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 

Plus de Mazin Alwaaly (20)

Pattern recognition voice biometrics
Pattern recognition voice biometricsPattern recognition voice biometrics
Pattern recognition voice biometrics
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
Pattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earPattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and ear
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Pattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionPattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognition
 
Pattern recognition forensic dental identification
Pattern recognition forensic dental identificationPattern recognition forensic dental identification
Pattern recognition forensic dental identification
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometric
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networks
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Multimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMultimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital libraries
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithms
 
Multimedia lossless compression algorithms
Multimedia lossless compression algorithmsMultimedia lossless compression algorithms
Multimedia lossless compression algorithms
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniques
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standards
 
Multimedia fundamental concepts in video
Multimedia fundamental concepts in videoMultimedia fundamental concepts in video
Multimedia fundamental concepts in video
 
Multimedia color in image and video
Multimedia color in image and videoMultimedia color in image and video
Multimedia color in image and video
 
Multimedia graphics and image data representation
Multimedia graphics and image data representationMultimedia graphics and image data representation
Multimedia graphics and image data representation
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 

Dernier

GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...Lokesh Kothari
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLkantirani197
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEayushi9330
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxRizalinePalanog2
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsSérgio Sacani
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...ssifa0344
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPirithiRaju
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptxAlMamun560346
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfSumit Kumar yadav
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)Areesha Ahmad
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and ClassificationsAreesha Ahmad
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPirithiRaju
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 

Dernier (20)

GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdf
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 

Pattern recognition fingerprints

  • 1.
  • 2. Fingerprint • A fingerprint is a unique pattern of ridges and valleys on the surface of a finger of an individual. A ridge is defined as a single curved segment, and a valley is the region between two adjacent ridges.
  • 3. Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: • A fingerprint is an individual characteristic; no two people have been found with the exact same fingerprint pattern. • A fingerprint pattern will remain unchanged for the life of an individual; however, the print itself may change due to permanent scars and skin diseases. • Fingerprints have general characteristic ridge patterns that allow them to be systematically identified.
  • 4. Fingerprint Classes There are 3 specific classes for all fingerprints based upon their visual pattern: arches, loops, and whorls. Each group is divided into smaller groups as seen in the lists below. Arch Plain arch Tented arch Loop Radial Loop Ulnar loop Whorl Plain whorl Central pocket whorl Double loop whorl Accidentical
  • 5. Interesting Info Fingerprint Factoid: 60% of people have loops, 35% have whorls, and 5% have arches
  • 6. Arches Arches are the simplest type of fingerprints that are formed by ridges that enter on one side of the print and exit on the other. No deltas are present. Plain Arch Ridges enter on one side and exit on the other side. Tented Arches Similar to the plain arch, but has a spike in the center. Spike or “tent”
  • 7. Loops Loops must have one delta and one or more ridges that enter and leave on the same side. These patterns are named for their positions related to the radius and ulna bones, i.e. the bone the loop opening is facing towards. Delta L – Radial Loop R - Ulnar Loop L – Ulnar Loop R - Radial Loop
  • 8. Whorls Whorls have at least one ridge that makes (or tends to make) a complete circuit. They also have at least two deltas. If a print has more than two deltas, it is most likely an accidental. Draw a line between the two deltas in the plain and central pocket whorls. If some of the curved ridges touch the line, it is a plain whorl. If none of the center core touches the line, it is a central pocket whorl. Plain Whorl Central Pocket Whorl
  • 9. Whorls Accidental Whorl Accidental whorls contain two or more patterns (not including the plain arch), or does not clearly fall under any of the other categories. Double Loop Whorl Double loop whorls are made up of any two loops combined into one print. Delta Delta
  • 10. Fingerprint Features 1. Global Ridge Pattern  A core is the uppermost of the innermost curving ridge  a delta point is the junction point where three ridge flows meet
  • 11. 2. Local Ridge Pattern • Local ridge details are the discontinuities of local ridge structure referred to as minutiae • A good quality image has around 40 to 100 minutiae
  • 12. Bifurcation Bridge Dot Double bifurcation Opposed bifurcation Island (short ridge) Hook (spur) Lake (enclosure) Ridge crossing Ridge ending Trifurcation Opposed bifurcation/ridge ending)
  • 13. Fingerprint Recognition • Fingerprint recognition (is referred as AFRS (Automatic Fingerprint Recognition System) • Fingerprint recognition is the process of comparing questioned and known fingerprint against another fingerprint to determine if the impressions are from the same finger
  • 14. • It includes two sub-domains: fingerprint verification (one to one matching) the purpose of fingerprint verification is to verify the identity of a person fingerprint identification(one to many matching) the goal of fingerprint identification is to establish the identity of a person.
  • 15. • Fingerprint recognition systems consist of the following parts: Image acquisition Pre-processing Feature extraction Matching
  • 16. Fingerprint Image Acquisition • There are numbers of different techniques for capturing a fingerprint image including optical, capacitive, radio frequency, ultrasound, and thermal methods. • One common shortcoming of many conventional fingerprint-sensing technologies is the frequent occurrence of poor-quality images under a variety of common operational circumstances.
  • 17. • Bad-quality images mostly result in spurious and missing features that then degrade the performance of the systems depending on these features. Hence, there is a need for a good enhancement method applied on fingerprint image to overcome these problems
  • 18. Pre-processing 1. Fingerprint image Binarization • In Binarization, the grey scale image is converted into binary image. Binary images are easy to process. The basic principle of converting an image into binary is to decide a threshold value, and then the pixels whose value are more than the threshold are converted to white pixels, and the pixels whose value are below or equal to the threshold value are converted to black pixels.
  • 19. 2. Finger print Image enhancement • The captured fingerprint image may contain various noises, thus cause poor matching result • To remove noise, some enhancement techniques are applied. 3. Fingerprint image segmentation • the primary purpose of segmentation is to avoid extraction of feature in the background that is in reality considered as a noisy area • Segmentation indicates the separation of fingerprint area or foreground from the image
  • 20. 4. Fingerprint image thinning • Thinning is to remove ridges edge pixels from the binary fingerprint image, so that only a single pixel describes the ridges, in order to facilitate minutiae extraction.
  • 21. Feature extraction &Matching • these features are stored as template, either to register new user, or to use it to be compared with other fingerprint template, stored in system database
  • 22. important things 1- cost :- cost rang from $100 to $2000 2- Ease of use :- medium. 3- Authentication:- Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprint. 4- Identification :- matching the characteristics of a fingerprint on file to the one presented to system . 5- physiological and/or behavior characteristics :- the fingerprint is physiological characteristics.
  • 23. 6- Ability to applied: This system can be applied, but needs to H/W and S/W whenever the devices have high specifications like (optical fingerprint scanner) with strong ways in determining the feature all that raise security and reliability ,if the cost of the system is high has increased security If the low-cost (the scanner for fingerprint) we can use more than one way such as palm and voice, So we get a high security at low cost. 7- Community acceptance :- low . 8- Automatic (real time) :- the fingerprint system divided into off-line in the (pre-processing ,feature extraction) part. on-line in the ( image acquisition , matching) part. It takes a few minutes 3-5 sec. 9-Life cycle:- fingerprint pattern will remain unchanged for the life of an individual. 10- maintenance requirement :- no need to maintenance.