0% found this document useful (0 votes)
41 views16 pages

Arvind (Fingerprint Recognition)

This document provides an overview of fingerprint recognition. It defines fingerprints and fingerprint recognition. Fingerprint recognition systems operate in three stages: fingerprint acquisition, minutia extraction, and minutia matching. Fingerprint recognition has applications in banking security, physical access control, information system security, national ID systems, and more due to its high accuracy and small storage requirements, though it can be impacted by dirt or wounds on fingers.

Uploaded by

Cool Arvind
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views16 pages

Arvind (Fingerprint Recognition)

This document provides an overview of fingerprint recognition. It defines fingerprints and fingerprint recognition. Fingerprint recognition systems operate in three stages: fingerprint acquisition, minutia extraction, and minutia matching. Fingerprint recognition has applications in banking security, physical access control, information system security, national ID systems, and more due to its high accuracy and small storage requirements, though it can be impacted by dirt or wounds on fingers.

Uploaded by

Cool Arvind
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Fingerprint Recognition

Presented By:- Guided By:-


Arvind Kumar Mahato Dr.Sarbeswara Hota
Regd.no-2161020025 Associate Professor
MCA 3rd Semester Department of ‘CA’
MCA-’B’
Outline
 Introduction To Biometrics
 Fingerprint
 What is Fingerprint Recognition?
 Fingerprint Recognition System
 Advantages
 Disadvantages
 Applications
 Conclusion
Biometrics
Biometrics is the science and technology of measuring and
analyzing biological data.
Biometrics refers to technologies that measure and analyze human
body characteristics such as DNA, Fingerprints, Eye retinas and
Irises, Voice patterns, Facial patterns and hand measurement for
authentication purposes.

The two categories of biometric identifiers include:-


Physiological Characteristics
Behavioral Characteristics
1.Physiological Characteristics :-
Fingerprint
Face Recognition
DNA
Palm Print
Hand Geometry
Iris Recognition

2.Behavioral Characteristics :-
Gait
Voice
Fingerprint
 A fingerprint is the feature pattern of one finger.
 It is the pattern of ridges and valleys on the surface of a
finger tip.
 Each individual has a unique fingerprints so the
uniqueness by the local ridge characteristics and their
relationships.
 These local ridges characteristics are not evenly
distributed.
 Fingerprints are distinguished by Minutiae, which are some
abnormal points on the ridges.
 The most prominent local ridges characteristics called minutiae
are-
1. Ridge Ending &
2. Ridge Bifurcation
 A ridge ending is defined as the point where a ridge ends Fig 1- A fingerprint
image acquired by an
unexpectedly. Optical Sensor
 A ridge bifurcation is defined as the point where a ridge forks or
diverges into branch ridges.

Fig 2- Ridges and Valley


What is Fingerprint Recognition?
 Fingerprint recognition is the process of comparing questioned and known
fingerprint against another fingerprint to determine if the impressions are from
the same finger or palm.

 The fingerprint recognition problem can be grouped into two sub-domains :-


 Fingerprint Verification :-
:-Fingerprint verification is to verify the authenticity of one person by his fingerprint.
 Fingerprint Identification :-
:-Fingerprint identification is to specify one persons identity by his/her fingerprints.
Fig 3- Verification VS Identification
Fingerprint Recognition System
 Fingerprint recognition system operates in three stages:-
I. Fingerprint acquiring device
II. Minutia extraction
III. Minutia matching

Fig 4- Fingerprint Recognition System


1- Fingerprint Acquisition:-
For fingerprint acquisition, optical or semi-conduct sensors are widely
used. They have high efficiency and acceptable accuracy expert for
some cases that the users finger is too dirty or dry.

2- Minutia Extractor:-
To implement a minutia extractor, a three stage approach is widely
used by researchers which are,
 Preprocessing,
 Minutia Extraction
 Post processing stage
Fig 5- Minutia Extractor
3- Minutia Matching :-
Generally, an automatic fingerprint verification is achieved with
minutia matching instead of a pixel-wise matching or a ridge pattern
matching of fingerprint images.
The minutia matcher chooses any two minutia as a reference minutia
pair and then match their associated ridges first.
If the ridges match well, two fingerprint images are aligned and
matching is conducted for all remaining minutia.
Advantages-
Very high Accuracy.
Easy to use.
Small storage space requires for the biometric template.

Disadvantages-
 Dirt, Grim & Wounds.
 Placement of finger.
 Can be spoofed.
Applications
 Banking Security- ATM security, Card transaction
 Physical Access Control (e.g. Airport)
 Information System Security
 National ID Systems
 Passport control (INSPASS)
 Prisoner, Prison Visitor, Inmate Control
 Voting
 Identification of Criminals
 Identification of missing child
 And many more---
Conclusion
 The implemented minutia extraction algorithm is accurate and fast
in minutia extraction.
 The algorithm also identifies the unrecoverable regions do appear
in some of the corrupted fingerprint images and they are extremely
harmful to minutia extraction.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy