SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Chan Ka Ki(12209716)
Ting Man Ho(12211907)
15 March 2013
Contents
Objectives
Introduction of Fingerprint
Recognition System
Survey Questions
Results And Analysis
Conclusion
Objectives
 Through conducting online survey and
locating the advantages, see how people can
benefit from the Fingerprint recognition
System.
 As an innovative technology, is this system
still has its market value or not?
Introduction of Fingerprint
Recognition System
 This is one of the Biometric devices that
is identification or verification of a
person by using biological and physical
characteristic such as
iris, speech, face, fingerprint, etc.
Fingerprint recognition System identifies
people by using Fingerprint.
Introduction of Fingerprint
Recognition System
Fingerprint application - Life is easier and convenient! (At Home) – YouTube
http://www.youtube.com/watch?v=9mm3oXnT7do
Fingerprint sensors
 An electronic device is used to
capture a digital image of the
fingerprint pattern
 Captured image is called a live scan
 Live scan is digitally processed to
create a biometric template
Used fingerprint sensor
technologies
Optical
- Involves capturing a digital image
of the print using visible light
- Type of sensor:Specialized
digital camera
Ultrasonic
- Use of the principles of medical
ultrasonography
- It uses very high frequency sound
waves to penetrate the epidermal layer
of skin
- Advantage: create a clean, undamaged
epidermal skin and a clean sensing
surface
 Capacitance
- Utilizes the principles associated with
capacitance in order to form fingerprint
images
- Sensor array pixels → one plate of a
parallel-plate capacitor;
- The dermal layer (which is electrically
conductive) → the other plate;
- The non-conductive epidermal layer →
dielectric.
Passive capacitance
- Principle:To form an image of the
fingerprint patterns on the dermal layer
of skin
- Each sensor pixel is used to measure
the capacitance at that point of the array
Active capacitance
- Use a charging cycle to apply a voltage
to the skin before measurement takes
place
- Advantage: create a clean, undamaged
epidermal skin and a clean sensing
surface.
- Active capacitance sensors measure
the ridge patterns of the dermal layer
like the ultrasonic method
Patterns of Fingerprint
Ridges
 Arch: The ridges enter from one side of
the finger, rise in the center forming an
arc, and then exit the other side of the
finger.
 Loop: The ridges enter from one side of
a finger, form a curve, and then exit on
that same side.
 Whorl: Ridges form circularly around a
central point on the finger.
Arch
Loop
Whorl
Application
E-channel (identify you when immigration)
Access to car
Access to device(Smartphone)
An USB Biometric Fingerprint
Reader Password Lock
To protect your computer by
preventing unauthorized access
and encrypting data in the
computer.
Different kinds of
Fingerprint Door Lock
To enhance the security of
places such as home.
 can easily add and remove
people that require temporary
admission to the place.
Advance Technology
 Touchless or contactless finger imaging is
essentially a remote sensing technology used
for the capture of the ridge-valley pattern with
no contact between the skin of the finger and
the sensing area.(Giuseppe Parziale and Yi
Chen, 2009)
 It is used the camera and
LED light to capture
fingerprint image.
 Reasons that touchless fingerprint
recognition system is better than the touch-
based one:
Touch-based Touchless
Affected by skin conditions
E.g. Dry skin or Wet skin
Capture fingerprint images
consistently because it is not
affected by different skin
conditions.
The fingerprint image will be
different due to different
pressure when put our finger
on the sensor.
Avoid the fingerprint image
distortion.
Job Division
Web Search
(Chan Ka Ki
Ting Man Ho)
Mind Map
(Chan Ka Ki)
Survey
(Chan Ka Ki)
Data Process
(Chan Ka Ki
Ting Man Ho)
Chart Creation
(Chan Ka Ki)
Power Point
(Chan Ka Ki
Ting Man Ho)
Analysis
(Ting Man Ho)
Information Collected(1)
 Web searching
1. Google.com
-Keywords for searching: “touchless
fingerprint recognition system”
2. Google.com(Image)
-Keywords for searching: “E-
channel”, “fingerprint access
computer”, “fingerprint system access place”
Information Collected(2)
 Library Resources
 E.g. OneSearch
 Keywords for searching: touchless
fingerprint
Mind Map
Online Survey
 Aim: Find out the situation of using
Fingerprint Recognition System
nowadays and the opinion of people on
the advantages of this System.
 Survey Link: http://goo.gl/b8VXB
 No. of responds:37
Survey Questions
 Q1: Have you ever used the following
applications of Fingerprint Recognition
System?
 Q2: How often do you use Fingerprint
Recognition System?
 Q3: Have you experienced failure of using
Fingerprint recognition system?
 Q4: Do you agree the following advantages
of Fingerprint Recognition System?
Survey Result(Q1)
47%
10%
10%
16%
10%
0%
7%
Have you ever used the following applications of Fingerprint Recognition
System?
Identification in immigration
and emigration (E.g. E-
channel)
Access to high secure places
Access to public buildings or
areas
Login to computers or other
digital devices
Protect the data, not allow
others to access the private
data on computers
Others
Never
Analysis 1
 The above pie chart reflects that almost
a half of respond have used E-channel
which takes 47% and 16% of respond
have used Fingerprint recognition
System to login some electrical devices.
 We can observe that Fingerprint
recognition System is very common
used and helpful in our daily life.
Survey Result(Q2)
1-3 times a week
9%
more than 3 times a
week
3%
1-3 times a month
0%
more than 3 times a
month
6%
1-5 times half of year
27%
more than 5 times
half of year
9%
1-3 times a year
43%
more than 3 times a
year
3%
How oftendo you use FingerprintRecognitionSystem?
 43% of respond said that they use
Fingerprint recognition System one to
three times per year while 27% used it
one to five times in half of year.
 Since many responds are teenagers in
this survey, they may not use it very
often. Mostly, they use this system to
immigrate only.
Analysis 2
Survey Result(Q3)
0
2
4
6
8
10
12
14
16
18
20
Yes No
Have you experiencedfailure of using Fingerprintrecognition
system?
Series1
 Over half of respond have experienced
failure of using Fingerprint recognition
System. It means this technology is not
100% reliable and sometimes error
would occur.
 There are many rooms for improvement
of this system.
Analysis 3
Survey Result(Q4)
High Security
Economic
Reliable
Convenient
Easy to use
14
0
3
9
5
20
22
23
19
21
2
14
11
8
8
0 1
0 1 2
1
0
0
0 1
Do you agree the following advantages of FingerprintRecognitionSystem?
Strongly Agree Agree Neutral Disagree Strongly Disagree
 There are almost 20 responds agree that
Fingerprint recognition System are
reliable, convenient, user-friendly and safe
etc. Only a few respond cannot benefit from
this system.
 This system brings a great deal of advantages
in our life which can be considered as a great
innovation.
Analysis 4
Conclusion
 Failure of identify people due to skin
conditions or other reasons so touch-
less fingerprint recognition system can
make improvement on this situation.
 Although the tool sometimes cannot
identify people, it is still a
helpful, convenient and reliable
innovation in nowadays.
Conclusion
 Majority of people use E-channel, it
saves time when immigrate.
 The tool can highly increase the security
of places and devices. Also, the price of
the tool is lower while the technology is
developed rapidly, it is worth buying.
Reference
 http://berc.yonsei.ac.kr/files/partner/finger/A%20study%20
of%20touchless%20fingerprint%20recognition%20system
s.pdf
Chulhan Lee, Sanghoon Lee, and Jaihie Kim, “A Study of
Touchless Fingerprint Recognition System”
 http://cherup.yonsei.ac.kr/research/research_Touchless%
20Fingerprint%20Recognition(110225).html
Anannya Negi, “Benefits Of Fingerprint Door Lock”
 http://link.springer.com/chapter/10.1007%2F978-1-84882-
385-3_4?LI=true#
Giuseppe Parziale, Yi Chen , “Advanced Technologies for
Touchless Fingerprint Recognition”
Fingerprint Survey Reveals Convenience and Reliability

Weitere ähnliche Inhalte

Was ist angesagt?

Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Real time gesture recognition
Real time gesture recognitionReal time gesture recognition
Real time gesture recognitionJaison2636
 
Sign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationSign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationTriloki Gupta
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition Usman Siddique
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Gesture Recognition Technology
Gesture Recognition TechnologyGesture Recognition Technology
Gesture Recognition TechnologyMuhammad Zeeshan
 
Gesture recognition technology
Gesture recognition technology Gesture recognition technology
Gesture recognition technology Nagamani Gurram
 
Biometric security system
Biometric security systemBiometric security system
Biometric security systemMithun Paul
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognitionDheerendra k
 

Was ist angesagt? (20)

Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Real time gesture recognition
Real time gesture recognitionReal time gesture recognition
Real time gesture recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Sign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols ClassificationSign Language Recognition based on Hands symbols Classification
Sign Language Recognition based on Hands symbols Classification
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Gesture Recognition Technology
Gesture Recognition TechnologyGesture Recognition Technology
Gesture Recognition Technology
 
Gesture recognition technology
Gesture recognition technology Gesture recognition technology
Gesture recognition technology
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Gesture Recognition
Gesture RecognitionGesture Recognition
Gesture Recognition
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 

Andere mochten auch

Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Sandeep Kumar Panda
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition Systemchristywong1234
 
Touchless and less-constrained 3D fingerprint recognition
Touchless and less-constrained 3D fingerprint recognitionTouchless and less-constrained 3D fingerprint recognition
Touchless and less-constrained 3D fingerprint recognitionAngelo Genovese
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identificationguest8cbcb02
 
Minutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingMinutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingNikhil Hubballi
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prj_publication
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionAn Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionMesbah Uddin Khan
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access systemAkshay Govekar
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingNabila mahjabin
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint RecognitionSecurity Session
 
Fingerprint matching from minutiae texture maps -com
Fingerprint matching from minutiae texture maps -comFingerprint matching from minutiae texture maps -com
Fingerprint matching from minutiae texture maps -comZhuo Zhang
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security systempraful borad
 
Latent Fingerprint Matching using Descriptor Based Hough Tranform
Latent Fingerprint Matching using Descriptor Based Hough TranformLatent Fingerprint Matching using Descriptor Based Hough Tranform
Latent Fingerprint Matching using Descriptor Based Hough Tranformvishakhmarari
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUAlpesh Kurhade
 

Andere mochten auch (20)

Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Touchless and less-constrained 3D fingerprint recognition
Touchless and less-constrained 3D fingerprint recognitionTouchless and less-constrained 3D fingerprint recognition
Touchless and less-constrained 3D fingerprint recognition
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
Minutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingMinutiae-based Fingerprint Matching
Minutiae-based Fingerprint Matching
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionAn Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint Recognition
 
Fingerprint matching from minutiae texture maps -com
Fingerprint matching from minutiae texture maps -comFingerprint matching from minutiae texture maps -com
Fingerprint matching from minutiae texture maps -com
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Latent Fingerprint Matching using Descriptor Based Hough Tranform
Latent Fingerprint Matching using Descriptor Based Hough TranformLatent Fingerprint Matching using Descriptor Based Hough Tranform
Latent Fingerprint Matching using Descriptor Based Hough Tranform
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPU
 

Ähnlich wie Fingerprint Survey Reveals Convenience and Reliability

2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
Accessing Operating System using Finger Gesture
Accessing Operating System using Finger GestureAccessing Operating System using Finger Gesture
Accessing Operating System using Finger GestureIRJET Journal
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul HananAbdul Hanan
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Fingerprint technology in our lives
Fingerprint technology in our livesFingerprint technology in our lives
Fingerprint technology in our livescodykong
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docxjoyjonna282
 
Artificial intelligence and sensor based assistive sytem for visually impaire...
Artificial intelligence and sensor based assistive sytem for visually impaire...Artificial intelligence and sensor based assistive sytem for visually impaire...
Artificial intelligence and sensor based assistive sytem for visually impaire...Gyana Ranjan Tripathy
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Abhishek Walia
 
Fingerprint recognitions on smart phone
Fingerprint recognitions on smart phoneFingerprint recognitions on smart phone
Fingerprint recognitions on smart phonektcube
 
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICA SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICIJERA Editor
 
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...IJMER
 
Media Player with Face Detection and Hand Gesture
Media Player with Face Detection and Hand GestureMedia Player with Face Detection and Hand Gesture
Media Player with Face Detection and Hand GestureIRJET Journal
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET Journal
 

Ähnlich wie Fingerprint Survey Reveals Convenience and Reliability (20)

2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Accessing Operating System using Finger Gesture
Accessing Operating System using Finger GestureAccessing Operating System using Finger Gesture
Accessing Operating System using Finger Gesture
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Fingerprint technology in our lives
Fingerprint technology in our livesFingerprint technology in our lives
Fingerprint technology in our lives
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Artificial intelligence and sensor based assistive sytem for visually impaire...
Artificial intelligence and sensor based assistive sytem for visually impaire...Artificial intelligence and sensor based assistive sytem for visually impaire...
Artificial intelligence and sensor based assistive sytem for visually impaire...
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Fingerprint recognitions on smart phone
Fingerprint recognitions on smart phoneFingerprint recognitions on smart phone
Fingerprint recognitions on smart phone
 
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICA SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
 
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
 
Media Player with Face Detection and Hand Gesture
Media Player with Face Detection and Hand GestureMedia Player with Face Detection and Hand Gesture
Media Player with Face Detection and Hand Gesture
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Fingerprint Survey Reveals Convenience and Reliability

  • 1. Chan Ka Ki(12209716) Ting Man Ho(12211907) 15 March 2013
  • 2. Contents Objectives Introduction of Fingerprint Recognition System Survey Questions Results And Analysis Conclusion
  • 3. Objectives  Through conducting online survey and locating the advantages, see how people can benefit from the Fingerprint recognition System.  As an innovative technology, is this system still has its market value or not?
  • 4. Introduction of Fingerprint Recognition System  This is one of the Biometric devices that is identification or verification of a person by using biological and physical characteristic such as iris, speech, face, fingerprint, etc. Fingerprint recognition System identifies people by using Fingerprint.
  • 5. Introduction of Fingerprint Recognition System Fingerprint application - Life is easier and convenient! (At Home) – YouTube http://www.youtube.com/watch?v=9mm3oXnT7do
  • 6. Fingerprint sensors  An electronic device is used to capture a digital image of the fingerprint pattern  Captured image is called a live scan  Live scan is digitally processed to create a biometric template
  • 7. Used fingerprint sensor technologies Optical - Involves capturing a digital image of the print using visible light - Type of sensor:Specialized digital camera
  • 8. Ultrasonic - Use of the principles of medical ultrasonography - It uses very high frequency sound waves to penetrate the epidermal layer of skin - Advantage: create a clean, undamaged epidermal skin and a clean sensing surface
  • 9.  Capacitance - Utilizes the principles associated with capacitance in order to form fingerprint images - Sensor array pixels → one plate of a parallel-plate capacitor; - The dermal layer (which is electrically conductive) → the other plate; - The non-conductive epidermal layer → dielectric.
  • 10. Passive capacitance - Principle:To form an image of the fingerprint patterns on the dermal layer of skin - Each sensor pixel is used to measure the capacitance at that point of the array
  • 11. Active capacitance - Use a charging cycle to apply a voltage to the skin before measurement takes place - Advantage: create a clean, undamaged epidermal skin and a clean sensing surface. - Active capacitance sensors measure the ridge patterns of the dermal layer like the ultrasonic method
  • 12. Patterns of Fingerprint Ridges  Arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger.  Loop: The ridges enter from one side of a finger, form a curve, and then exit on that same side.  Whorl: Ridges form circularly around a central point on the finger.
  • 14. Application E-channel (identify you when immigration) Access to car
  • 15. Access to device(Smartphone) An USB Biometric Fingerprint Reader Password Lock To protect your computer by preventing unauthorized access and encrypting data in the computer.
  • 16. Different kinds of Fingerprint Door Lock To enhance the security of places such as home.  can easily add and remove people that require temporary admission to the place.
  • 17. Advance Technology  Touchless or contactless finger imaging is essentially a remote sensing technology used for the capture of the ridge-valley pattern with no contact between the skin of the finger and the sensing area.(Giuseppe Parziale and Yi Chen, 2009)  It is used the camera and LED light to capture fingerprint image.
  • 18.  Reasons that touchless fingerprint recognition system is better than the touch- based one: Touch-based Touchless Affected by skin conditions E.g. Dry skin or Wet skin Capture fingerprint images consistently because it is not affected by different skin conditions. The fingerprint image will be different due to different pressure when put our finger on the sensor. Avoid the fingerprint image distortion.
  • 19. Job Division Web Search (Chan Ka Ki Ting Man Ho) Mind Map (Chan Ka Ki) Survey (Chan Ka Ki) Data Process (Chan Ka Ki Ting Man Ho) Chart Creation (Chan Ka Ki) Power Point (Chan Ka Ki Ting Man Ho) Analysis (Ting Man Ho)
  • 20. Information Collected(1)  Web searching 1. Google.com -Keywords for searching: “touchless fingerprint recognition system” 2. Google.com(Image) -Keywords for searching: “E- channel”, “fingerprint access computer”, “fingerprint system access place”
  • 21. Information Collected(2)  Library Resources  E.g. OneSearch  Keywords for searching: touchless fingerprint
  • 23. Online Survey  Aim: Find out the situation of using Fingerprint Recognition System nowadays and the opinion of people on the advantages of this System.  Survey Link: http://goo.gl/b8VXB  No. of responds:37
  • 24. Survey Questions  Q1: Have you ever used the following applications of Fingerprint Recognition System?  Q2: How often do you use Fingerprint Recognition System?  Q3: Have you experienced failure of using Fingerprint recognition system?  Q4: Do you agree the following advantages of Fingerprint Recognition System?
  • 25. Survey Result(Q1) 47% 10% 10% 16% 10% 0% 7% Have you ever used the following applications of Fingerprint Recognition System? Identification in immigration and emigration (E.g. E- channel) Access to high secure places Access to public buildings or areas Login to computers or other digital devices Protect the data, not allow others to access the private data on computers Others Never
  • 26. Analysis 1  The above pie chart reflects that almost a half of respond have used E-channel which takes 47% and 16% of respond have used Fingerprint recognition System to login some electrical devices.  We can observe that Fingerprint recognition System is very common used and helpful in our daily life.
  • 27. Survey Result(Q2) 1-3 times a week 9% more than 3 times a week 3% 1-3 times a month 0% more than 3 times a month 6% 1-5 times half of year 27% more than 5 times half of year 9% 1-3 times a year 43% more than 3 times a year 3% How oftendo you use FingerprintRecognitionSystem?
  • 28.  43% of respond said that they use Fingerprint recognition System one to three times per year while 27% used it one to five times in half of year.  Since many responds are teenagers in this survey, they may not use it very often. Mostly, they use this system to immigrate only. Analysis 2
  • 29. Survey Result(Q3) 0 2 4 6 8 10 12 14 16 18 20 Yes No Have you experiencedfailure of using Fingerprintrecognition system? Series1
  • 30.  Over half of respond have experienced failure of using Fingerprint recognition System. It means this technology is not 100% reliable and sometimes error would occur.  There are many rooms for improvement of this system. Analysis 3
  • 31. Survey Result(Q4) High Security Economic Reliable Convenient Easy to use 14 0 3 9 5 20 22 23 19 21 2 14 11 8 8 0 1 0 1 2 1 0 0 0 1 Do you agree the following advantages of FingerprintRecognitionSystem? Strongly Agree Agree Neutral Disagree Strongly Disagree
  • 32.  There are almost 20 responds agree that Fingerprint recognition System are reliable, convenient, user-friendly and safe etc. Only a few respond cannot benefit from this system.  This system brings a great deal of advantages in our life which can be considered as a great innovation. Analysis 4
  • 33. Conclusion  Failure of identify people due to skin conditions or other reasons so touch- less fingerprint recognition system can make improvement on this situation.  Although the tool sometimes cannot identify people, it is still a helpful, convenient and reliable innovation in nowadays.
  • 34. Conclusion  Majority of people use E-channel, it saves time when immigrate.  The tool can highly increase the security of places and devices. Also, the price of the tool is lower while the technology is developed rapidly, it is worth buying.
  • 35. Reference  http://berc.yonsei.ac.kr/files/partner/finger/A%20study%20 of%20touchless%20fingerprint%20recognition%20system s.pdf Chulhan Lee, Sanghoon Lee, and Jaihie Kim, “A Study of Touchless Fingerprint Recognition System”  http://cherup.yonsei.ac.kr/research/research_Touchless% 20Fingerprint%20Recognition(110225).html Anannya Negi, “Benefits Of Fingerprint Door Lock”  http://link.springer.com/chapter/10.1007%2F978-1-84882- 385-3_4?LI=true# Giuseppe Parziale, Yi Chen , “Advanced Technologies for Touchless Fingerprint Recognition”