SlideShare a Scribd company logo
3
Most read
5
Most read
19
Most read
Fingerprint Recognition

Presented By:
Ranjit R, Banshpal
Outline
•
•
•
•
•
•
•
•

Introduction to biometrics
Fingerprint
What is Fingerprint Recognition?
Fingerprint recognition system
Advantages
Disadvantages
Applications
Conclusion
Biometrics
• Biometrics is the science and technology of
measuring and analyzing biological data
• Biometrics refers to technologies that
measure and analyze human body
characteristics, such as DNA, fingerprints,
eye retinas and irises, voice patterns ,facial
patterns and hand measurements, for
authentication purposes.
• The two categories of biometric identifiers
include :
 physiological characteristics.
 behavioral characteristics.
Physiological characteristics :
 Fingerprint
 face recognition
 DNA
 palm print
 hand geometry
 iris recognition(which has largely replaced retina)
 Odour /scent.

Behavioral characteristics :
 Gait
 voice
Fingerprint
• A fingerprint is the feature pattern of one
finger.
• It is the pattern of ridges and valleys (also
called furrows in the fingerprint literature)
on the surface of a fingertip.
• Each individual has unique fingerprints so
the uniqueness of a fingerprint is exclusively
determined by the local ridge characteristics
and their relationships
• These local ridge characteristics are not
evenly distributed.
Fig 1. A fingerprint image acquired by an Optical
Sensor
•
•

Fingerprints are distinguished by Minutiae, which are some abnormal
points on the ridges.
The two most prominent local ridge characteristics, called minutiae, are
1) ridge ending and
2) ridge bifurcation.
• A ridge ending is defined as the point
where a ridge ends abruptly.
• A ridge bifurcation is defined as the point
where
a ridge forks or diverges into branch
ridges.

Fig 2.ridge and valley
What is Fingerprint Recognition?
• Fingerprint recognition (sometimes
referred to as dactyloscopy) is the process
of comparing questioned and known
fingerprint against another fingerprint to
determine if the impressions are from the
same finger or palm.
• The fingerprint recognition problem can
be grouped into two sub-domains:
 Fingerprint verification :
Fingerprint verification is to verify the
authenticity of one person by his
fingerprint.
 Fingerprint identification:
Fingerprint identification is to specify one
person’s identity by his fingerprint(s).
Fig 3.Verification vs. Identification
FINGERPRINT RECOGNITION SYSTEM
• Fingerprint recognition system operates
in three stages:
(i) Fingerprint acquiring device
(ii) Minutia extraction and
(iii) Minutia matching

Fig 4. Fingerprint recognition system
1.Fingerprint acquisition:
For fingerprint acquisition, optical or semiconduct sensors are widely used. They
have high efficiency and acceptable
accuracy except for some cases that the
user’s finger is too dirty or dry.
2.Minutia extractor :
To implement a minutia extractor, a threestage approach is widely used by
researchers which are
 preprocessing
 minutia extraction and
 postprocessing stage.
Fig 5.Minutia extractor
• For the fingerprint image preprocessing
stage:
 Image enhancement
 Image binarization
 Image segmentation
• The job of minutiae extraction closes down
to two operations: Ridge Thinning, Minutiae
Marking,.
• In post-processing stage, false minutia are
removed and bifurcations is proposed to
unify terminations and bifurcations.
3.Minutiae Matching:
• Generally,
an
automatic
fingerprint
verification is achieved with minutia
matching (point pattern matching)instead of
a pixel-wise matching or a ridge pattern
matching of fingerprint images.
• The minutia matcher chooses any two
minutia as a reference minutia pair and then
match their associated ridges first.
• If the ridges match well, two fingerprint
images are aligned and matching is
conducted for all remaining minutia.
ADVANTAGES
Very high accuracy.
Easy to use.
Small storage space required for the
biometric template.
DISADVANTAGES
Dirt , grime and wounds .
Placement of finger.
Can be spoofed .
applications
Banking Security - ATM security,card
transaction
Physical Access Control (e.g. Airport)
Information System Security
National ID Systems
Passport control (INSPASS)
Prisoner, prison visitors, inmate control
Voting
Identification of Criminals
Identification of missing children
Secure E-Commerce (Still under research)
Conclusion
• The implemented minutia extraction
algorithm is accurate and fast in minutia
extraction.
• The algorithm also identifies the
unrecoverable corrupted regions in the
fingerprint and removes them from further
processing.
• This is a very important property because
such unrecoverable regions do appear in
some of the corrupted fingerprint images
and they are extremely harmful to minutiae
extraction.
Fingerprint recognition

More Related Content

PPTX
Fingerprint recognition presentation
Vivek Kumar
 
PDF
Fingerprint recognition
varsha mohite
 
PPTX
Fingerprint presentation
rajarose89
 
PPT
Finger print recognition
Karam Munir Butt
 
PPT
BIOMETRICS FINGER PRINT TECHNOLOGY
sathish sak
 
PPT
Fingerprint Recognition Technique(PPT)
Sandeep Kumar Panda
 
PPSX
Face recognition technology - BEST PPT
Siddharth Modi
 
PPTX
Interrupts in 8051
Sudhanshu Janwadkar
 
Fingerprint recognition presentation
Vivek Kumar
 
Fingerprint recognition
varsha mohite
 
Fingerprint presentation
rajarose89
 
Finger print recognition
Karam Munir Butt
 
BIOMETRICS FINGER PRINT TECHNOLOGY
sathish sak
 
Fingerprint Recognition Technique(PPT)
Sandeep Kumar Panda
 
Face recognition technology - BEST PPT
Siddharth Modi
 
Interrupts in 8051
Sudhanshu Janwadkar
 

What's hot (20)

PDF
Biometrics/fingerprint sensors
Jeffrey Funk
 
PPT
Finger print sensor and its application
Arnab Podder
 
PPTX
Fingerprint scanner
Ausaf khan
 
PPTX
Fingerprint recognition system by sagar chand gupta
scg121433
 
PPTX
Face recognition
sandeepsharma1193
 
PPTX
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
PPTX
Fingerprint Biometrics
Rudra Prasad Maiti
 
PPT
Fingerprint Technology
Joy Dutta
 
PPTX
Biometrics iris recognition
sunjaysahu
 
PPTX
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
PPTX
Biometrics
Bhupeshkumar Nanhe
 
PPTX
Signature verification in biometrics
Swapnil Bangera
 
PPTX
Atm using fingerprint
AnIsh Kumar
 
PPTX
Multi modal biometric system
Aalaa Khattab
 
PPTX
Biometrics Technology, Types & Applications
Usman Sheikh
 
PPTX
Fingerprint
badaniparamesh
 
PPT
biometric technology
Anmol Bagga
 
PPTX
Biometrics
umertariq12345
 
PPTX
Fundamentals steps in Digital Image processing
KarthicaMarasamy
 
PPTX
Introduction To Biometrics
Abdul Rehman
 
Biometrics/fingerprint sensors
Jeffrey Funk
 
Finger print sensor and its application
Arnab Podder
 
Fingerprint scanner
Ausaf khan
 
Fingerprint recognition system by sagar chand gupta
scg121433
 
Face recognition
sandeepsharma1193
 
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
Fingerprint Biometrics
Rudra Prasad Maiti
 
Fingerprint Technology
Joy Dutta
 
Biometrics iris recognition
sunjaysahu
 
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
Biometrics
Bhupeshkumar Nanhe
 
Signature verification in biometrics
Swapnil Bangera
 
Atm using fingerprint
AnIsh Kumar
 
Multi modal biometric system
Aalaa Khattab
 
Biometrics Technology, Types & Applications
Usman Sheikh
 
Fingerprint
badaniparamesh
 
biometric technology
Anmol Bagga
 
Biometrics
umertariq12345
 
Fundamentals steps in Digital Image processing
KarthicaMarasamy
 
Introduction To Biometrics
Abdul Rehman
 
Ad

Viewers also liked (20)

PPT
fingerprint technology
VishwasJangra
 
PPTX
Fingerprint Identification
guest8cbcb02
 
PDF
Fingerprint Recognition Technique(PDF)
Sandeep Kumar Panda
 
PPT
Fingerprint Pattern
Cebu Normal University
 
PPT
50409621003 fingerprint recognition system-ppt
Mohankumar Ramachandran
 
PPTX
Fingerprint classification rules
KUL2700
 
PPT
fingerprint classification systems Henry and NCIC
KUL2700
 
PPTX
High protection ATM system with fingerprint identification technology
Alfred Oboi
 
PPT
Biometric's final ppt
Ankita Vanage
 
DOCX
Fingerprint based transaction system
sagar solanky
 
PDF
Fingerprinting in India
Shantanu Basu
 
PPTX
Whorl Patterns
Jury Rocamora
 
PPTX
Fingerprint Classification- Loop Patterns
Jury Rocamora
 
PPT
Face recognition ppt
Santosh Kumar
 
PPT
Ridge counting-and-tracing
darwendloualbores
 
PPTX
Classification
guest8cbcb02
 
PPTX
Finger reader
yamini rayalu
 
PPT
Legal issues related to dna fingerprinting in india
IndianScholars
 
PPTX
Fingerprint base security system
praful borad
 
PPTX
Finger print ATM
Ankan Biswas
 
fingerprint technology
VishwasJangra
 
Fingerprint Identification
guest8cbcb02
 
Fingerprint Recognition Technique(PDF)
Sandeep Kumar Panda
 
Fingerprint Pattern
Cebu Normal University
 
50409621003 fingerprint recognition system-ppt
Mohankumar Ramachandran
 
Fingerprint classification rules
KUL2700
 
fingerprint classification systems Henry and NCIC
KUL2700
 
High protection ATM system with fingerprint identification technology
Alfred Oboi
 
Biometric's final ppt
Ankita Vanage
 
Fingerprint based transaction system
sagar solanky
 
Fingerprinting in India
Shantanu Basu
 
Whorl Patterns
Jury Rocamora
 
Fingerprint Classification- Loop Patterns
Jury Rocamora
 
Face recognition ppt
Santosh Kumar
 
Ridge counting-and-tracing
darwendloualbores
 
Classification
guest8cbcb02
 
Finger reader
yamini rayalu
 
Legal issues related to dna fingerprinting in india
IndianScholars
 
Fingerprint base security system
praful borad
 
Finger print ATM
Ankan Biswas
 
Ad

Similar to Fingerprint recognition (20)

PPTX
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
PPTX
Fingerprint Authentication Seminar.pptx
sahoosabyasachi000
 
PPTX
Seminar
Nidhi Nayan
 
PPTX
Presentation suresh maurya
SureshKumarMaurya5
 
PPT
Biometics technology
Praween Lakra
 
PDF
Fingerprint recognition using minutiae based feature
varsha mohite
 
PPTX
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
DOCX
GANNON UNIVERSITYELECTR.docx
joyjonna282
 
DOCX
Fingerprint recognition (term paper) Project
Abhishek Walia
 
PPT
Biometrics
Rana Bilal
 
PPT
Bio-metrics Technology
Avanitrambadiya
 
PPTX
Biometric technology
Sudip Sadhukhan
 
PPTX
Dip fingerprint
Akash Patel
 
PDF
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
ijsrd.com
 
PPTX
Biometrics fingerprint
Sagar Verma
 
PPTX
Fingerprint Analaysis
ANIKLAL2
 
ODP
Biometrics final ppt
Vishak Illath veed
 
PPTX
BIOMETRIC IDENTIFICATION IN ATM’S PPT
sravya raju
 
PPTX
Bio-Metric Technology
shyampariyar
 
PDF
Fingerprint Based Biometric ATM Authentication System
International Journal of Engineering Inventions www.ijeijournal.com
 
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
Fingerprint Authentication Seminar.pptx
sahoosabyasachi000
 
Seminar
Nidhi Nayan
 
Presentation suresh maurya
SureshKumarMaurya5
 
Biometics technology
Praween Lakra
 
Fingerprint recognition using minutiae based feature
varsha mohite
 
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
GANNON UNIVERSITYELECTR.docx
joyjonna282
 
Fingerprint recognition (term paper) Project
Abhishek Walia
 
Biometrics
Rana Bilal
 
Bio-metrics Technology
Avanitrambadiya
 
Biometric technology
Sudip Sadhukhan
 
Dip fingerprint
Akash Patel
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
ijsrd.com
 
Biometrics fingerprint
Sagar Verma
 
Fingerprint Analaysis
ANIKLAL2
 
Biometrics final ppt
Vishak Illath veed
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
sravya raju
 
Bio-Metric Technology
shyampariyar
 
Fingerprint Based Biometric ATM Authentication System
International Journal of Engineering Inventions www.ijeijournal.com
 

More from ranjit banshpal (15)

PPTX
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
ranjit banshpal
 
PPT
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
ranjit banshpal
 
PPTX
Secure Image Retrieval based on Hybrid Features and Hashes
ranjit banshpal
 
PPT
LCT in day2 day life
ranjit banshpal
 
PPT
“Web crawler”
ranjit banshpal
 
PPT
Data mining technique for classification and feature evaluation using stream ...
ranjit banshpal
 
PPTX
Parallelization using open mp
ranjit banshpal
 
PPTX
Face recognition technology
ranjit banshpal
 
PPT
using big-data methods analyse the Cross platform aviation
ranjit banshpal
 
PPT
E mail image spam filtering techniques
ranjit banshpal
 
PPTX
Hybrid encryption
ranjit banshpal
 
PPTX
Autocorrelators1
ranjit banshpal
 
PPT
Static Networks
ranjit banshpal
 
PPT
Ranjitbanshpal
ranjit banshpal
 
DOC
Ranjitbanshpal1
ranjit banshpal
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
ranjit banshpal
 
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
ranjit banshpal
 
Secure Image Retrieval based on Hybrid Features and Hashes
ranjit banshpal
 
LCT in day2 day life
ranjit banshpal
 
“Web crawler”
ranjit banshpal
 
Data mining technique for classification and feature evaluation using stream ...
ranjit banshpal
 
Parallelization using open mp
ranjit banshpal
 
Face recognition technology
ranjit banshpal
 
using big-data methods analyse the Cross platform aviation
ranjit banshpal
 
E mail image spam filtering techniques
ranjit banshpal
 
Hybrid encryption
ranjit banshpal
 
Autocorrelators1
ranjit banshpal
 
Static Networks
ranjit banshpal
 
Ranjitbanshpal
ranjit banshpal
 
Ranjitbanshpal1
ranjit banshpal
 

Recently uploaded (20)

PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 

Fingerprint recognition

  • 2. Outline • • • • • • • • Introduction to biometrics Fingerprint What is Fingerprint Recognition? Fingerprint recognition system Advantages Disadvantages Applications Conclusion
  • 3. Biometrics • Biometrics is the science and technology of measuring and analyzing biological data • Biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns ,facial patterns and hand measurements, for authentication purposes. • The two categories of biometric identifiers include :  physiological characteristics.  behavioral characteristics.
  • 4. Physiological characteristics :  Fingerprint  face recognition  DNA  palm print  hand geometry  iris recognition(which has largely replaced retina)  Odour /scent. Behavioral characteristics :  Gait  voice
  • 5. Fingerprint • A fingerprint is the feature pattern of one finger. • It is the pattern of ridges and valleys (also called furrows in the fingerprint literature) on the surface of a fingertip. • Each individual has unique fingerprints so the uniqueness of a fingerprint is exclusively determined by the local ridge characteristics and their relationships • These local ridge characteristics are not evenly distributed.
  • 6. Fig 1. A fingerprint image acquired by an Optical Sensor • • Fingerprints are distinguished by Minutiae, which are some abnormal points on the ridges. The two most prominent local ridge characteristics, called minutiae, are 1) ridge ending and 2) ridge bifurcation.
  • 7. • A ridge ending is defined as the point where a ridge ends abruptly. • A ridge bifurcation is defined as the point where a ridge forks or diverges into branch ridges. Fig 2.ridge and valley
  • 8. What is Fingerprint Recognition? • Fingerprint recognition (sometimes referred to as dactyloscopy) is the process of comparing questioned and known fingerprint against another fingerprint to determine if the impressions are from the same finger or palm.
  • 9. • The fingerprint recognition problem can be grouped into two sub-domains:  Fingerprint verification : Fingerprint verification is to verify the authenticity of one person by his fingerprint.  Fingerprint identification: Fingerprint identification is to specify one person’s identity by his fingerprint(s).
  • 10. Fig 3.Verification vs. Identification
  • 11. FINGERPRINT RECOGNITION SYSTEM • Fingerprint recognition system operates in three stages: (i) Fingerprint acquiring device (ii) Minutia extraction and (iii) Minutia matching Fig 4. Fingerprint recognition system
  • 12. 1.Fingerprint acquisition: For fingerprint acquisition, optical or semiconduct sensors are widely used. They have high efficiency and acceptable accuracy except for some cases that the user’s finger is too dirty or dry. 2.Minutia extractor : To implement a minutia extractor, a threestage approach is widely used by researchers which are  preprocessing  minutia extraction and  postprocessing stage.
  • 14. • For the fingerprint image preprocessing stage:  Image enhancement  Image binarization  Image segmentation • The job of minutiae extraction closes down to two operations: Ridge Thinning, Minutiae Marking,. • In post-processing stage, false minutia are removed and bifurcations is proposed to unify terminations and bifurcations.
  • 15. 3.Minutiae Matching: • Generally, an automatic fingerprint verification is achieved with minutia matching (point pattern matching)instead of a pixel-wise matching or a ridge pattern matching of fingerprint images. • The minutia matcher chooses any two minutia as a reference minutia pair and then match their associated ridges first. • If the ridges match well, two fingerprint images are aligned and matching is conducted for all remaining minutia.
  • 16. ADVANTAGES Very high accuracy. Easy to use. Small storage space required for the biometric template.
  • 17. DISADVANTAGES Dirt , grime and wounds . Placement of finger. Can be spoofed .
  • 18. applications Banking Security - ATM security,card transaction Physical Access Control (e.g. Airport) Information System Security National ID Systems Passport control (INSPASS) Prisoner, prison visitors, inmate control Voting Identification of Criminals Identification of missing children Secure E-Commerce (Still under research)
  • 19. Conclusion • The implemented minutia extraction algorithm is accurate and fast in minutia extraction. • The algorithm also identifies the unrecoverable corrupted regions in the fingerprint and removes them from further processing. • This is a very important property because such unrecoverable regions do appear in some of the corrupted fingerprint images and they are extremely harmful to minutiae extraction.