National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS200127358 “Fingerprint Verification.

Slides:



Advertisements
Similar presentations
Match On Card Technology and its use for PKI Mgr. Miroslav Valeš Sales Manager Eastern Europe May 9, 2001 CATE 2001 Security and Protection.
Advertisements

Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
BIOMETRIC VOTING SYSTEM
Automatic Fingerprint Acquisition System An example employing Hardware-Software Co- Design - Komal kasat Nalini Kumar Gaurav Chitroda.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Credit Card Fingerprint Scanner Dennis Seran CS 410 / Spring 2004.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
PALM VEIN TECHNOLOGY.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometrics: Voice Recognition
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
Biometrics Part 2  Access Control 1.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Authentication Approaches over Internet Jia Li
Introduction to Biometric Systems
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
“Fingerprint Recognition based on Silicon Chips”.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
Presentation transcript:

National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification ” Under the guidance of Dr. S. K. Meher 1

National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Introduction  Fingerprint verification is the most widely used and developed of the technologies.  There are three technologies used to get good images and these are Optical, Silicon, and Ultrasound.  Biometrics, the measurement of a unique physical characteristic, is an ideal solution to the problem of digital identification.  The biometrics available, including face, iris and retina scanning, voice identification, and others. 2

National Institute of Science & Technology Fingerprint Verification Maheswar Dalai History of Fingerprint Pre-history picture writing found in Nova Scotia shows a hand with ridge patterns. An ancient China thumbprints were used on clay seals to prove identity in financial transactions 1686 Marcello Malpighi, a professor of anatomy at the University of Bologna, wrote about ridges, loops, and spirals in fingerprints 1823 Processor Purkinji from the University of Breslau described nine basic fingerprint patterns. These pattern descriptors are still used today. 3

National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Basics of Fingerprint Verification Ridges Fingerprint Identification Terminology Minutia Points Global Versus Local Features  Basic Ridge Patterns  Pattern Area  Core Area  Delta  Type Lines 4

National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Hardware Architecture 5

National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Hardware Details It’s working is as such:  The finger contacts the thin, light-emitting TactileSense polymer.  TactileSense creates an illuminated image.  A photodiode array embedded in the glass detects the illumination.  The image is translated into digital format by the electronics embedded into the glass.  Image data is transmitted to the device hosting the fingerprint security application for enrollment or verification. 6

National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Software Architecture 7 User Application Development API Layer Ethentica SDK API Device Driver Fingerprint module Hardware (T_FPM)

National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Steps of Fingerprint Verification 8 Finger Image sensor Extraction Algorithm Match Algorithm Stored Fingerprint template ImagingExtraction fingerprint image Storage fingerprint compare Match ok Or No Match

National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Benefits of the New Technology  Reduced Size  Design Flexibility  Lower Power Consumption  Lower Cost/Long-Term Cost Efficiencies  Reliability  Durability/Decreased Risk of Failure 9

National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Development Tools Hardware T-FPM Fingerprint Sensor, Mechanical and Electrical Design Specifications Platform Support Windows95, Windows 98, Windows NT and Windows 2000 Drivers. Tool Kit Softaware development tools include: 1. Raw fingerprint image data acquisition 2. Device initialization 3. Verification/ authentication of fingerprints. 10

National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Advantages Each and every one of our ten fingerprints is unique, different from another and from those of every other person. Even identical twines have unique fingerprints. Unlike passwords, PIN codes, and smartcards that we depend upon today for identification, our fingerprints are impossible to lose or forge, and they can never be stolen. We have ten fingerprints as opposed to one voice, one face or two eyes. Fingerprints have been used for centuries for identification, and we have a substantial body of real world data upon which to base our claim of the uniqueness of each fingerprint. Iris scanning, for instance, is an entirely new science for which there is little or no real world data. 11

National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Conclusion Fingerprint verification method is the most popular method among all the biometrics methods for identification/verification of a person. For many companies, fingerprint verification system are the perfect answer to the expensive and time- consuming problems of fraud, theft, and access control Technical and financial consideration aside, biometrics facial can pose a significant cultural challenge and introducing fingerprint scanners desktop or a recognition entry system has to be done sensitively 12

National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Thank U… 13

National Institute of Science & Technology Fingerprint Verification Maheswar Dalai