0% found this document useful (0 votes)
6 views4 pages

Ultimate

The document discusses how fingerprint recognition works by identifying individuals based on fingerprint patterns and features. It describes the basic fingerprint patterns of arches, loops and whorls. It also discusses the minutiae features of ridges, bifurcations and dots that fingerprint readers use. Finally, it outlines the main types of fingerprint readers as optical, capacitive, ultrasound and thermal and provides a brief overview of the fingerprint identification system process.

Uploaded by

Yoyo tube
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views4 pages

Ultimate

The document discusses how fingerprint recognition works by identifying individuals based on fingerprint patterns and features. It describes the basic fingerprint patterns of arches, loops and whorls. It also discusses the minutiae features of ridges, bifurcations and dots that fingerprint readers use. Finally, it outlines the main types of fingerprint readers as optical, capacitive, ultrasound and thermal and provides a brief overview of the fingerprint identification system process.

Uploaded by

Yoyo tube
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

How Fingerprint Recognition works?

Fingerprint recognition refers to the automated method of identifying or confirming the identity of an
individual based on the comparison of two fingerprints. Fingerprint recognition is one of the well known
biometrics, and it is by far the most used biometric solution for authentication on computerized
systems. The reasons for fingerprint recognition being so popular are the ease of acquisition, established
use and acceptance when compared to other biometrics, and the fact that there are numerous (ten)
sources of this biometric on each individual.

Fingerprint patterns
Basic patterns

The three basic patterns of fingerprint ridges are the arch, the loop, and the whorl. An arch is a
pattern where the ridge enters one side of the finger, then rises in the center forming an arch, and
exits on the other side of the finger. With a loop the ridge enters one side of the finger, then
forms a curve, and exits on the same side of the finger from which it entered. Loops are the most
common pattern in fingerprints. Finally a whorl is the pattern you have when ridges form
circularly around a central point.
Refer to the images below for examples of each pattern.

Minutiae features

Minutiae refer to specific points in a fingerprint, these are the small details in a fingerprint that
are most important for fingerprint recognition.

There are three major types of minutiae features: the ridge ending, the bifurcation, and the dot
(also called short ridge). The ridge ending is, as indicated by the name, the spot where a ridge
ends. A bifurcation is the spot where a ridge splits into two ridges. Spots are those fingerprint
ridges that are significantly shorter than other ridges.
Fingerprint readers
There exist four main types of fingerprint reader hardware:

1. Optical readers are the most common type of fingerprint readers. The type of sensor in
an optical reader is a digital camera that acquires a visual image of the fingerprint.
Advantages are that optical readers start at very cheap prices. Disadvantages are that
readings are impacted by dirty or marked fingers, and this type of fingerprint reader is
easier to fool than others.
2. Capacitive readers, also referred to as CMOS readers, do not read the fingerprint using
light. Instead a CMOS reader uses capacitors and thus electrical current to form an image
of the fingerprint. CMOS readers are more expensive than optical readers, although they
still come relatively cheap with prices starting well below 100 euro’s.
An important advantage of capacitive readers over optical readers is that a capacitive
reader requires a real fingerprint shape rather than only a visual image. This makes
CMOS readers harder to trick.
3. Ultrasound readers are the most recent type of fingerprint readers, they use high
frequency sound waves to penetrate the epidermal (outer) layer of the skin. They read the
fingerprint on the dermal skin layer, which eliminates the need for a clean, unscarred
surface. All other types of fingerprint readers acquire an image of the outer surface, thus
requiring hands to be cleaned and free of scars before read-out. This type of fingerprint
reader is far more expensive than the first two, however due to their accuracy and the fact
that they are difficult to fool the ultrasound readers are already very popular.
4. Thermal readers sense, on a contact surface, the difference of temperature in between
fingerprint ridges and valleys. Thermal fingerprint readers have a number of
disadvantages such as higher power consumption and a performance that depends on the
environment temperature.

Finger print images that are found or scanned are not of optimum quality. So we remove
noises and enhance their quality. We extract features like minutiae and others for matching. If
the sets of minutiae are matched with those in the database, we called it unidentified
fingerprint. After matching, we perform post-matching steps which may include showing details
of identified candidate, marking attendance etc. A brief flow chart is shown in next section.

Finger Print Identification System Flow Chart


A brief methodology of our Fingerprint Identification System is shown here in following flowchart .Each
of these are explained in the later chapter.

Figure. Fingerprint Identification System Flowchart.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy