SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Fingerprint Recognition

Presented By:
Ranjit R, Banshpal
Outline
•
•
•
•
•
•
•
•

Introduction to biometrics
Fingerprint
What is Fingerprint Recognition?
Fingerprint recognition system
Advantages
Disadvantages
Applications
Conclusion
Biometrics
• Biometrics is the science and technology of
measuring and analyzing biological data
• Biometrics refers to technologies that
measure and analyze human body
characteristics, such as DNA, fingerprints,
eye retinas and irises, voice patterns ,facial
patterns and hand measurements, for
authentication purposes.
• The two categories of biometric identifiers
include :
 physiological characteristics.
 behavioral characteristics.
Physiological characteristics :
 Fingerprint
 face recognition
 DNA
 palm print
 hand geometry
 iris recognition(which has largely replaced retina)
 Odour /scent.

Behavioral characteristics :
 Gait
 voice
Fingerprint
• A fingerprint is the feature pattern of one
finger.
• It is the pattern of ridges and valleys (also
called furrows in the fingerprint literature)
on the surface of a fingertip.
• Each individual has unique fingerprints so
the uniqueness of a fingerprint is exclusively
determined by the local ridge characteristics
and their relationships
• These local ridge characteristics are not
evenly distributed.
Fig 1. A fingerprint image acquired by an Optical
Sensor
•
•

Fingerprints are distinguished by Minutiae, which are some abnormal
points on the ridges.
The two most prominent local ridge characteristics, called minutiae, are
1) ridge ending and
2) ridge bifurcation.
• A ridge ending is defined as the point
where a ridge ends abruptly.
• A ridge bifurcation is defined as the point
where
a ridge forks or diverges into branch
ridges.

Fig 2.ridge and valley
What is Fingerprint Recognition?
• Fingerprint recognition (sometimes
referred to as dactyloscopy) is the process
of comparing questioned and known
fingerprint against another fingerprint to
determine if the impressions are from the
same finger or palm.
• The fingerprint recognition problem can
be grouped into two sub-domains:
 Fingerprint verification :
Fingerprint verification is to verify the
authenticity of one person by his
fingerprint.
 Fingerprint identification:
Fingerprint identification is to specify one
person’s identity by his fingerprint(s).
Fig 3.Verification vs. Identification
FINGERPRINT RECOGNITION SYSTEM
• Fingerprint recognition system operates
in three stages:
(i) Fingerprint acquiring device
(ii) Minutia extraction and
(iii) Minutia matching

Fig 4. Fingerprint recognition system
1.Fingerprint acquisition:
For fingerprint acquisition, optical or semiconduct sensors are widely used. They
have high efficiency and acceptable
accuracy except for some cases that the
user’s finger is too dirty or dry.
2.Minutia extractor :
To implement a minutia extractor, a threestage approach is widely used by
researchers which are
 preprocessing
 minutia extraction and
 postprocessing stage.
Fig 5.Minutia extractor
• For the fingerprint image preprocessing
stage:
 Image enhancement
 Image binarization
 Image segmentation
• The job of minutiae extraction closes down
to two operations: Ridge Thinning, Minutiae
Marking,.
• In post-processing stage, false minutia are
removed and bifurcations is proposed to
unify terminations and bifurcations.
3.Minutiae Matching:
• Generally,
an
automatic
fingerprint
verification is achieved with minutia
matching (point pattern matching)instead of
a pixel-wise matching or a ridge pattern
matching of fingerprint images.
• The minutia matcher chooses any two
minutia as a reference minutia pair and then
match their associated ridges first.
• If the ridges match well, two fingerprint
images are aligned and matching is
conducted for all remaining minutia.
ADVANTAGES
Very high accuracy.
Easy to use.
Small storage space required for the
biometric template.
DISADVANTAGES
Dirt , grime and wounds .
Placement of finger.
Can be spoofed .
applications
Banking Security - ATM security,card
transaction
Physical Access Control (e.g. Airport)
Information System Security
National ID Systems
Passport control (INSPASS)
Prisoner, prison visitors, inmate control
Voting
Identification of Criminals
Identification of missing children
Secure E-Commerce (Still under research)
Conclusion
• The implemented minutia extraction
algorithm is accurate and fast in minutia
extraction.
• The algorithm also identifies the
unrecoverable corrupted regions in the
fingerprint and removes them from further
processing.
• This is a very important property because
such unrecoverable regions do appear in
some of the corrupted fingerprint images
and they are extremely harmful to minutiae
extraction.
Fingerprint recognition

Weitere ähnliche Inhalte

Was ist angesagt?

Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its applicationArnab Podder
 

Was ist angesagt? (20)

Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its application
 

Andere mochten auch

Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identificationguest8cbcb02
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Sandeep Kumar Panda
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-pptMohankumar Ramachandran
 
Fingerprint classification rules
Fingerprint classification rulesFingerprint classification rules
Fingerprint classification rulesKUL2700
 
fingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICfingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICKUL2700
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction systemsagar solanky
 
Fingerprinting in India
Fingerprinting in IndiaFingerprinting in India
Fingerprinting in IndiaShantanu Basu
 
Fingerprint Classification- Loop Patterns
Fingerprint Classification- Loop PatternsFingerprint Classification- Loop Patterns
Fingerprint Classification- Loop PatternsJury Rocamora
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Legal issues related to dna fingerprinting in india
Legal issues related to dna fingerprinting in indiaLegal issues related to dna fingerprinting in india
Legal issues related to dna fingerprinting in indiaIndianScholars
 

Andere mochten auch (20)

Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)
 
Fingerprint Pattern
Fingerprint PatternFingerprint Pattern
Fingerprint Pattern
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-ppt
 
Fingerprint classification rules
Fingerprint classification rulesFingerprint classification rules
Fingerprint classification rules
 
fingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICfingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCIC
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Fingerprinting in India
Fingerprinting in IndiaFingerprinting in India
Fingerprinting in India
 
Whorl Patterns
Whorl PatternsWhorl Patterns
Whorl Patterns
 
Fingerprint Classification- Loop Patterns
Fingerprint Classification- Loop PatternsFingerprint Classification- Loop Patterns
Fingerprint Classification- Loop Patterns
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Ridge counting-and-tracing
Ridge counting-and-tracingRidge counting-and-tracing
Ridge counting-and-tracing
 
Classification
ClassificationClassification
Classification
 
Finger reader
Finger readerFinger reader
Finger reader
 
Legal issues related to dna fingerprinting in india
Legal issues related to dna fingerprinting in indiaLegal issues related to dna fingerprinting in india
Legal issues related to dna fingerprinting in india
 

Ähnlich wie Fingerprint recognition

sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 
Fingerprint Authentication Seminar.pptx
Fingerprint Authentication  Seminar.pptxFingerprint Authentication  Seminar.pptx
Fingerprint Authentication Seminar.pptxsahoosabyasachi000
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featurevarsha mohite
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docxjoyjonna282
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Abhishek Walia
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
Fingerprint Analaysis
Fingerprint AnalaysisFingerprint Analaysis
Fingerprint AnalaysisANIKLAL2
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 

Ähnlich wie Fingerprint recognition (20)

sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Fingerprint Authentication Seminar.pptx
Fingerprint Authentication  Seminar.pptxFingerprint Authentication  Seminar.pptx
Fingerprint Authentication Seminar.pptx
 
Seminar
SeminarSeminar
Seminar
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Fingerprint Analaysis
Fingerprint AnalaysisFingerprint Analaysis
Fingerprint Analaysis
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 

Mehr von ranjit banshpal

Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...ranjit banshpal
 
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHESSECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHESranjit banshpal
 
Secure Image Retrieval based on Hybrid Features and Hashes
Secure Image Retrieval based on Hybrid Features and HashesSecure Image Retrieval based on Hybrid Features and Hashes
Secure Image Retrieval based on Hybrid Features and Hashesranjit banshpal
 
Data mining technique for classification and feature evaluation using stream ...
Data mining technique for classification and feature evaluation using stream ...Data mining technique for classification and feature evaluation using stream ...
Data mining technique for classification and feature evaluation using stream ...ranjit banshpal
 
Parallelization using open mp
Parallelization using open mpParallelization using open mp
Parallelization using open mpranjit banshpal
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
using big-data methods analyse the Cross platform aviation
 using big-data methods analyse the Cross platform aviation using big-data methods analyse the Cross platform aviation
using big-data methods analyse the Cross platform aviationranjit banshpal
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniquesranjit banshpal
 

Mehr von ranjit banshpal (15)

Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHESSECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
 
Secure Image Retrieval based on Hybrid Features and Hashes
Secure Image Retrieval based on Hybrid Features and HashesSecure Image Retrieval based on Hybrid Features and Hashes
Secure Image Retrieval based on Hybrid Features and Hashes
 
LCT in day2 day life
LCT in day2 day lifeLCT in day2 day life
LCT in day2 day life
 
“Web crawler”
“Web crawler”“Web crawler”
“Web crawler”
 
Data mining technique for classification and feature evaluation using stream ...
Data mining technique for classification and feature evaluation using stream ...Data mining technique for classification and feature evaluation using stream ...
Data mining technique for classification and feature evaluation using stream ...
 
Parallelization using open mp
Parallelization using open mpParallelization using open mp
Parallelization using open mp
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
using big-data methods analyse the Cross platform aviation
 using big-data methods analyse the Cross platform aviation using big-data methods analyse the Cross platform aviation
using big-data methods analyse the Cross platform aviation
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
Autocorrelators1
Autocorrelators1Autocorrelators1
Autocorrelators1
 
Static Networks
Static NetworksStatic Networks
Static Networks
 
Ranjitbanshpal
RanjitbanshpalRanjitbanshpal
Ranjitbanshpal
 
Ranjitbanshpal1
Ranjitbanshpal1Ranjitbanshpal1
Ranjitbanshpal1
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Fingerprint recognition

  • 2. Outline • • • • • • • • Introduction to biometrics Fingerprint What is Fingerprint Recognition? Fingerprint recognition system Advantages Disadvantages Applications Conclusion
  • 3. Biometrics • Biometrics is the science and technology of measuring and analyzing biological data • Biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns ,facial patterns and hand measurements, for authentication purposes. • The two categories of biometric identifiers include :  physiological characteristics.  behavioral characteristics.
  • 4. Physiological characteristics :  Fingerprint  face recognition  DNA  palm print  hand geometry  iris recognition(which has largely replaced retina)  Odour /scent. Behavioral characteristics :  Gait  voice
  • 5. Fingerprint • A fingerprint is the feature pattern of one finger. • It is the pattern of ridges and valleys (also called furrows in the fingerprint literature) on the surface of a fingertip. • Each individual has unique fingerprints so the uniqueness of a fingerprint is exclusively determined by the local ridge characteristics and their relationships • These local ridge characteristics are not evenly distributed.
  • 6. Fig 1. A fingerprint image acquired by an Optical Sensor • • Fingerprints are distinguished by Minutiae, which are some abnormal points on the ridges. The two most prominent local ridge characteristics, called minutiae, are 1) ridge ending and 2) ridge bifurcation.
  • 7. • A ridge ending is defined as the point where a ridge ends abruptly. • A ridge bifurcation is defined as the point where a ridge forks or diverges into branch ridges. Fig 2.ridge and valley
  • 8. What is Fingerprint Recognition? • Fingerprint recognition (sometimes referred to as dactyloscopy) is the process of comparing questioned and known fingerprint against another fingerprint to determine if the impressions are from the same finger or palm.
  • 9. • The fingerprint recognition problem can be grouped into two sub-domains:  Fingerprint verification : Fingerprint verification is to verify the authenticity of one person by his fingerprint.  Fingerprint identification: Fingerprint identification is to specify one person’s identity by his fingerprint(s).
  • 10. Fig 3.Verification vs. Identification
  • 11. FINGERPRINT RECOGNITION SYSTEM • Fingerprint recognition system operates in three stages: (i) Fingerprint acquiring device (ii) Minutia extraction and (iii) Minutia matching Fig 4. Fingerprint recognition system
  • 12. 1.Fingerprint acquisition: For fingerprint acquisition, optical or semiconduct sensors are widely used. They have high efficiency and acceptable accuracy except for some cases that the user’s finger is too dirty or dry. 2.Minutia extractor : To implement a minutia extractor, a threestage approach is widely used by researchers which are  preprocessing  minutia extraction and  postprocessing stage.
  • 14. • For the fingerprint image preprocessing stage:  Image enhancement  Image binarization  Image segmentation • The job of minutiae extraction closes down to two operations: Ridge Thinning, Minutiae Marking,. • In post-processing stage, false minutia are removed and bifurcations is proposed to unify terminations and bifurcations.
  • 15. 3.Minutiae Matching: • Generally, an automatic fingerprint verification is achieved with minutia matching (point pattern matching)instead of a pixel-wise matching or a ridge pattern matching of fingerprint images. • The minutia matcher chooses any two minutia as a reference minutia pair and then match their associated ridges first. • If the ridges match well, two fingerprint images are aligned and matching is conducted for all remaining minutia.
  • 16. ADVANTAGES Very high accuracy. Easy to use. Small storage space required for the biometric template.
  • 17. DISADVANTAGES Dirt , grime and wounds . Placement of finger. Can be spoofed .
  • 18. applications Banking Security - ATM security,card transaction Physical Access Control (e.g. Airport) Information System Security National ID Systems Passport control (INSPASS) Prisoner, prison visitors, inmate control Voting Identification of Criminals Identification of missing children Secure E-Commerce (Still under research)
  • 19. Conclusion • The implemented minutia extraction algorithm is accurate and fast in minutia extraction. • The algorithm also identifies the unrecoverable corrupted regions in the fingerprint and removes them from further processing. • This is a very important property because such unrecoverable regions do appear in some of the corrupted fingerprint images and they are extremely harmful to minutiae extraction.