SlideShare a Scribd company logo
1 of 32
PROF.V.B.SHAH INSTITUTE OF MANAGEMENT & R.V.PATEL COLLEGE OF COMMERCE (ENG.MED.) & V.L.SHAH COLLEGE OF COMMERCE
(GUJ.MED.) &
SUTEX BANK COLLEGE OF COMPUTER APPLICATIONS & SCIENCE, AMROLI
VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT
Submitted By
Mr. Prince Finaviya -
71
Guided By
Asst. Prof. Mansi
Shah
FINGERPRINT
AUTHENTICATI
ON
CONTENT
• Introduction
• What is a biometric?
• Method of verification
• Fingerprint recognition
• Verification & authentication
• Applications area of biometric
• Advantages of biometrics
• Disadvantages of biometrics
• Reference
INTRODUCTION
• Fingerprint authentication technology widely used now days for security
reason.
• Many system want first identify user then give access to use the system .
• Identification process are easy to use now days . just because of fingerprint
authentication.
• Fingerprints have been accepted as the most common form of biometrics
authentication today.
• Every human beings fingerprint is unique. Each fingerprint has a unique
characteristic and pattern that is made up of lines and spaces.
• The lines are called ridges while the spaces between the ridges are called
valleys. These patterns of ridges and valleys are used to match the
fingerprint for verification and authentication.
• There are about one billion possible minutiae combinations on a
fingerprint; since there are about 5 billion people inhabiting the earth, and
each has ten fingers, this means that statistically it is likely that fifty
people on earth share a fingerprint”.
• In identification process, an individual presents a sample to the biometric
system during enrolment. The biometric system then attempts to compare
the sample with the database which has samples stored in it. This is one-
to-many form of comparison. The identification process is further divided
into positive identification and negative identification.
WHAT IS BIOMETRIC ?
• Biometrics are automated methods of identifying a
person or verifying the identity of a person based on
a physiological or behavioural characteristic.
Biometrics as authentication
Something You Know
Something You Have
Something You Are
• Can be combined with other tools to form more
secure, easier to use verification solutions.
• Recognizes individuals definitively.
METHOD OF VERIFICATION
There are two methods of verification for security.
Psychological verification :
Verification of the organs of the human being, which will have unique identification.
There are five types of verifications.
These are:
Fingerpri
nt
Handpri
nt
Face
measurement
Retinal
scans
DNA
analysis
 Finger print
It involves the user placing his finger over a glass-plate, which resides
over a high-resolution camera, which uses optical or electromagnetic means
to take its snapshot.
 Handprint
It compares a 3D image of the users hand to that present in the
system database. It is somewhat similar to finger print verification.
 Face measurement
measuring this is as simple as taking a picture and analyzing the image
from a security video capture. This technique enables the computer to use
your face as your password and matching these to an existing database
 Retinal scans
It involves imaging of the blood vessels in the retina of the eye when
infrared light of a certain frequency and wavelength is incident upon it. This
energy is absorbed by the blood vessels is different in different individuals.
 DNA analysis
It involves in checking the dna pattern of a human used when physical
characteristics are unrecognizable
• This is one biometric that is judicially accepted. No human have identified
similar DNA patterns except in twins.
Behavioural verification
this involves in oral thing done by the individual.
There are 3 types of behavioral verifications,
 Typing
 Signature
 Voice
Typing
Some systems measure things you do in addition to the things
you are, you will notice that your typing has a certain pattern. Some
letters follow others in quick succession, while others take longer.
 Signature
Some qualities looked into include acceleration rates, direction, and
pressure and stroke length. Here mainly concentrate on pressures. This
pressures stored in back end for future significations.
 Voice
It involves in the recognition of the voice of the individual.
FINGERPRINT RECOGNITION
• This is a technique used to match and identify unique finger prints that might
need to be stored and then accessed in a database.
WHY FINGERPRINT RECOGNITION?
 Pin's and passwords may be forgotten
 The fingerprints in twins are not the same.
 Relies on the concept that no two people have identical fingerprints.
 More secure.
 A person's fingerprint will not naturally change structure after about one
year after birth
FINGERPRINT RECOGNITION SYSTEMS
Fingerprint recognition system is a free tool that will recognize and verify
fingerprints.
Fingerprint identification system is a biometric identification (id) methodology that
uses digital imaging technology to obtain, store, and analyze fingerprint data.
The three main functions of fingerprint recognition systems are:
1) Acquisition of fingerprints
2) Derivation of characteristics and
3) Matching
FINGERPRINT RECOGNITION STEPS
Database
FINGERPRINT SENSORS
 Fingerprint scanners are security systems of biometrics. They are now used
in police stations, security industries and most recently, on computers.
 A fingerprint sensor is an electronic device used to capture a digital image of
the fingerprint pattern. The captured image is called a live scan.
There are two types of fingerprint scanners:
 1. The optical scanner
optical fingerprint imaging involves capturing a digital image of
the print using visible light.
 2. The ultrasonic scanner
Ultrasonic sensors make use of the principles of medical ultra
sonography in order to create visual images of the fingerprint
VERIFICATION AND AUTHENTICATION
 This refers to the automated method of verifying a match between two
human fingerprints.
 The analysis of fingerprints for matching purposes generally are of two types
1)patterns
The three basic patterns of fingerprint ridges
they are:
A) arch
B) loop
C) whorl
 Arch:
the ridges enter from one side of the finger, rise in the center forming an arc,
and then exit the other side of the finger.
 Loop:
the ridges enter from one side of a finger and then exit on that same side.
 Whorl:
ridges form circularly around a central point on the finger.
2)Minutia
The major minutia features of fingerprint ridges are
a) ridge ending
b) bifurcation.
C) short ridge (dot).
A) ridge ending
The ridge ending is the point at which a ridge terminates
 B) Bifurcation
Bifurcations are points at which a single ridge splits into two ridges.
c) Short ridges
Short ridges (or dots) are ridges which are significantly shorter than the
average ridge length on the fingerprint.
APPLICATION AREA OF BIOMETRIC
o Fingerprint based biometrics has primarily been used to secure entry
devices for building door locks and computer network access.
o Perhaps one of the most common uses of biometric technology is
smartphone security. Apple were the first to introduce the touch ID solution
using fingerprint recognition technology and since then, mobile phone
security has evolved to utilize a number of biometric technologies including
facial recognition, iris recognition and voice recognition. A small number of
banks use fingerprint readers for authorization at atms.
o Grocery stores are experimenting with a fingerprint scan checkout that
automatically recognizes and bills a registered user’s credit card or debit
account.
ADVANTAGES OF BIOMETRICS
o It provide good security mechanism than all other security methods
o It never fails in security constraints.
o In public locations such as banks and airports a large number of people
transit every day including known criminals. Face recognition systems
attached to video surveillance systems are supposed to help catch them.
o Fairly small storage space is required for the biometric template, reducing
the size of the database required.
o It is one of the most developed biometrics, with more history, research, and
design.
DISADVANTAGES OF BIOMETRICS
o It needs high memory space in the back end.
o Collect data for security is difficult
o Sometimes fails the security with right users
o Any time data loose in database high effect for security mechanism.
o So many equipment’s are needed for provide this technology.
o It highly expensive
o Facial imaging can also hinder accurate identifications.
o Missing body part problem.
REFERENCE
• HTTPS://WWW.ARROW.COM/EN/RESEARCH-AND-EVENTS/ARTICLES/HOW-
FINGERPRINT-SENSORS-WORK
• HTTPS://WWW.SEMINARSTOPICS.COM/SEMINAR/9286/FINGER-PRINT-
AUTHENTICATION
• HTTPS://WWW.ALLEYDOG.COM/GLOSSARY/DEFINITION.PHP?TERM=BIOMETRICS
• HTTPS://WWW.ANDROIDAUTHORITY.COM/HOW-FINGERPRINT-SCANNERS-WORK-
670934/
Thank
You

More Related Content

Similar to 2019001791_Fingerprint_Authentication.pptx

sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 

Similar to 2019001791_Fingerprint_Authentication.pptx (20)

Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Bio-Metrics through finger print
Bio-Metrics through finger print Bio-Metrics through finger print
Bio-Metrics through finger print
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 

Recently uploaded (20)

How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 

2019001791_Fingerprint_Authentication.pptx

  • 1. PROF.V.B.SHAH INSTITUTE OF MANAGEMENT & R.V.PATEL COLLEGE OF COMMERCE (ENG.MED.) & V.L.SHAH COLLEGE OF COMMERCE (GUJ.MED.) & SUTEX BANK COLLEGE OF COMPUTER APPLICATIONS & SCIENCE, AMROLI VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT Submitted By Mr. Prince Finaviya - 71 Guided By Asst. Prof. Mansi Shah
  • 3. CONTENT • Introduction • What is a biometric? • Method of verification • Fingerprint recognition • Verification & authentication • Applications area of biometric • Advantages of biometrics • Disadvantages of biometrics • Reference
  • 4. INTRODUCTION • Fingerprint authentication technology widely used now days for security reason. • Many system want first identify user then give access to use the system . • Identification process are easy to use now days . just because of fingerprint authentication. • Fingerprints have been accepted as the most common form of biometrics authentication today.
  • 5. • Every human beings fingerprint is unique. Each fingerprint has a unique characteristic and pattern that is made up of lines and spaces. • The lines are called ridges while the spaces between the ridges are called valleys. These patterns of ridges and valleys are used to match the fingerprint for verification and authentication. • There are about one billion possible minutiae combinations on a fingerprint; since there are about 5 billion people inhabiting the earth, and each has ten fingers, this means that statistically it is likely that fifty people on earth share a fingerprint”. • In identification process, an individual presents a sample to the biometric system during enrolment. The biometric system then attempts to compare the sample with the database which has samples stored in it. This is one- to-many form of comparison. The identification process is further divided into positive identification and negative identification.
  • 6. WHAT IS BIOMETRIC ? • Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological or behavioural characteristic. Biometrics as authentication Something You Know Something You Have Something You Are • Can be combined with other tools to form more secure, easier to use verification solutions. • Recognizes individuals definitively.
  • 7. METHOD OF VERIFICATION There are two methods of verification for security. Psychological verification : Verification of the organs of the human being, which will have unique identification. There are five types of verifications. These are: Fingerpri nt Handpri nt Face measurement Retinal scans DNA analysis
  • 8.  Finger print It involves the user placing his finger over a glass-plate, which resides over a high-resolution camera, which uses optical or electromagnetic means to take its snapshot.
  • 9.  Handprint It compares a 3D image of the users hand to that present in the system database. It is somewhat similar to finger print verification.
  • 10.  Face measurement measuring this is as simple as taking a picture and analyzing the image from a security video capture. This technique enables the computer to use your face as your password and matching these to an existing database
  • 11.  Retinal scans It involves imaging of the blood vessels in the retina of the eye when infrared light of a certain frequency and wavelength is incident upon it. This energy is absorbed by the blood vessels is different in different individuals.
  • 12.  DNA analysis It involves in checking the dna pattern of a human used when physical characteristics are unrecognizable • This is one biometric that is judicially accepted. No human have identified similar DNA patterns except in twins.
  • 13. Behavioural verification this involves in oral thing done by the individual. There are 3 types of behavioral verifications,  Typing  Signature  Voice Typing Some systems measure things you do in addition to the things you are, you will notice that your typing has a certain pattern. Some letters follow others in quick succession, while others take longer.
  • 14.  Signature Some qualities looked into include acceleration rates, direction, and pressure and stroke length. Here mainly concentrate on pressures. This pressures stored in back end for future significations.  Voice It involves in the recognition of the voice of the individual.
  • 15. FINGERPRINT RECOGNITION • This is a technique used to match and identify unique finger prints that might need to be stored and then accessed in a database.
  • 16. WHY FINGERPRINT RECOGNITION?  Pin's and passwords may be forgotten  The fingerprints in twins are not the same.  Relies on the concept that no two people have identical fingerprints.  More secure.  A person's fingerprint will not naturally change structure after about one year after birth
  • 17. FINGERPRINT RECOGNITION SYSTEMS Fingerprint recognition system is a free tool that will recognize and verify fingerprints. Fingerprint identification system is a biometric identification (id) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data. The three main functions of fingerprint recognition systems are: 1) Acquisition of fingerprints 2) Derivation of characteristics and 3) Matching
  • 19. FINGERPRINT SENSORS  Fingerprint scanners are security systems of biometrics. They are now used in police stations, security industries and most recently, on computers.  A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan.
  • 20. There are two types of fingerprint scanners:  1. The optical scanner optical fingerprint imaging involves capturing a digital image of the print using visible light.  2. The ultrasonic scanner Ultrasonic sensors make use of the principles of medical ultra sonography in order to create visual images of the fingerprint
  • 21. VERIFICATION AND AUTHENTICATION  This refers to the automated method of verifying a match between two human fingerprints.  The analysis of fingerprints for matching purposes generally are of two types 1)patterns The three basic patterns of fingerprint ridges they are: A) arch B) loop C) whorl
  • 22.  Arch: the ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger.
  • 23.  Loop: the ridges enter from one side of a finger and then exit on that same side.
  • 24.  Whorl: ridges form circularly around a central point on the finger.
  • 25. 2)Minutia The major minutia features of fingerprint ridges are a) ridge ending b) bifurcation. C) short ridge (dot). A) ridge ending The ridge ending is the point at which a ridge terminates
  • 26.  B) Bifurcation Bifurcations are points at which a single ridge splits into two ridges.
  • 27. c) Short ridges Short ridges (or dots) are ridges which are significantly shorter than the average ridge length on the fingerprint.
  • 28. APPLICATION AREA OF BIOMETRIC o Fingerprint based biometrics has primarily been used to secure entry devices for building door locks and computer network access. o Perhaps one of the most common uses of biometric technology is smartphone security. Apple were the first to introduce the touch ID solution using fingerprint recognition technology and since then, mobile phone security has evolved to utilize a number of biometric technologies including facial recognition, iris recognition and voice recognition. A small number of banks use fingerprint readers for authorization at atms. o Grocery stores are experimenting with a fingerprint scan checkout that automatically recognizes and bills a registered user’s credit card or debit account.
  • 29. ADVANTAGES OF BIOMETRICS o It provide good security mechanism than all other security methods o It never fails in security constraints. o In public locations such as banks and airports a large number of people transit every day including known criminals. Face recognition systems attached to video surveillance systems are supposed to help catch them. o Fairly small storage space is required for the biometric template, reducing the size of the database required. o It is one of the most developed biometrics, with more history, research, and design.
  • 30. DISADVANTAGES OF BIOMETRICS o It needs high memory space in the back end. o Collect data for security is difficult o Sometimes fails the security with right users o Any time data loose in database high effect for security mechanism. o So many equipment’s are needed for provide this technology. o It highly expensive o Facial imaging can also hinder accurate identifications. o Missing body part problem.
  • 31. REFERENCE • HTTPS://WWW.ARROW.COM/EN/RESEARCH-AND-EVENTS/ARTICLES/HOW- FINGERPRINT-SENSORS-WORK • HTTPS://WWW.SEMINARSTOPICS.COM/SEMINAR/9286/FINGER-PRINT- AUTHENTICATION • HTTPS://WWW.ALLEYDOG.COM/GLOSSARY/DEFINITION.PHP?TERM=BIOMETRICS • HTTPS://WWW.ANDROIDAUTHORITY.COM/HOW-FINGERPRINT-SCANNERS-WORK- 670934/