Fingerprint

download Fingerprint

of 17

description

Help full to read the finger printer,how it works and other more important things.

Transcript of Fingerprint

FINGER PRINT BASED ATM AND LOCKER SYSTEM FOR MODERN SECURED BANKS

Fingerprint Recognization with Biomatric TechnolohyByJaiswal anant o.GuideMr. krunal patel

AGENDAWhat is Fingerprint?Why Fingerprints Use?Fingerprints PatternApplioationAdwantagesDisadvantagesApplicationIntroductionFingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints.Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity.Fingerprints has been used since 14th century in china.These patterns are fully developed under pregnancy and are permanent throughout whole lifetimeIn 1788, Johann Mayer noted that the arrangement of skin ridges is never duplicated in two persons. He was probably the first scientist to recognize this factInjuries such as burns or scrapes will not change the ridge structure: when new skin grows in, the same pattern will come back.We leave impressionsor printsof these patterns on everything we touch with any pressure.

Introductionin 1902 the first systematic use of fingerprints was tested in the U.S.A. by the New York Civil Service Commission and in 1903 the New York State Prison system began the first systematic use of fingerprints in the U.S. for criminals

Why Fingerprint ?Passwords are not reliable.Too many Can be stolenForgottenProtect Sensitive InformationBankingMedicalReliable and trustedWill never leave at homeFingerprints are uniqueEveryone is born with one80% of public has biometric recordedNo two persons have the same fingerprintsAll fingers, toes, feet, and palms are covered in small ridges.

Versus other Biometric TechnologiesTechnologyAccuracyConvenienceCostSizeFingerprint5544Voice1555Face2343Hand3322Iris52331 (worst) 5 (best)Fingerprint patternS

MinutiaeCrossover: two ridges cross each otherCore: centerBifurcation: ridge separatesRidge ending: end pointIsland: small ridge b/w 2 spacesDelta: space between ridgesPore: human poreFingerprint patternS

Ridge lines enter from one side and curve around to exit from the same side.60-65% of population.Rounded and circular ridge pattern.30-35% of population.Ridge lines enter from one side print and exit out the other5% populationFingerprint patternSArches are the simplest type of fingerprints that are formed by ridges that enter on one side of the print and exit on the other. No deltas are present.archesPlain ArchRidges enter on one side and exit on the other side.

Tented Arches Similar to the plain arch, but has a spike in the center.Fingerprint patternSLoops must have one delta and one or more ridges that enter and leave on the same side. These patterns are named for their positions related to the radius and ulna bones.

Ulnar Loop (Right Thumb)Loop opens toward right or the ulna bone.

Radial Loop (Right Thumb)Loop opens toward the left or the radial bone.LoopsFingerprint patternSWhorls have at least one ridge that makes (or tends to make) a complete circuit. They also have at least two deltas. If a print has more than two deltas, it is most likely an accidental.whorls

Plain WhorlCentral Pocket Whorl data flow daigramShow the matching Score Thump ImpressionExtractParticular IdentifyEntire VerificationDatabaseIf MatchesShow the Particular ID NoDoes Not ExistFalseTrueIf MatchesDoes not matchTrueEnrollFalse apliCATIONS

Banking Security - ATM security,card transactionPhysical Access Control (e.g. Airport)Information System SecurityNational ID SystemsPassport control (INSPASS)Prisoner, prison visitors, inmate controlVotingIdentification of CriminalsIdentification of missing childrenSecure E-Commerce (Still under research)

Fingerprint door lock

Fingerprint scanner:A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. authenticate the identity of a person through the fingerprint, which is verified by a machine known as fingerprint scanner This machine is made in such a way that when a person presents his or her finger on the scanner, it scans the print and matches it with the ones that are available in its database to verify the identification.

Advantages:

Fingerprint has no risk of Forgetting itGetting in stolenGetting it copiedBeing used by anyone else Easy to use. it is one of the most developed biometrics

Limitations:

Identify friction ridge characteristics and compare two fingerprints with at least ten points of identification. Limitations:For some people it is very intrusive, because is still related to criminal identification. It can make mistakes with the dryness or dirty of the fingers skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly). Image captured at 500 dots per inch (dpi). Resolution: 8 bits per pixel. A 500 dpi fingerprint image at 8 bits per pixel demands a large memory space, 240 Kbytes approximately Compression required (a factor of 10 approximately).