Fingerprint authentication
#3
[attachment=2713]

FINGERPRINT Authentication SYSTEM



Presented By:
BY: SETU SRIVASTAVA
ROLL NO.- 84/A
SEMESTER-7th




INTRODUCTION:
BIOMETRICS:

Biometrics is derived from Greek word bios means life and metron means measure. By this method we can uniquely recognize human based on their physical and behavioral traits.

FINGERPRINT AUHENTICATION:

Fingerprints are one of many forms of biometrics used to identify an individual and verify their identity.

It refers to the automated method of verifying a match between two human fingerprints.



REASON:


The simple fact is that passwords donâ„¢t work very well.


No need to remember passwords or to carry smart cards.


Simple, trusted and convenient user interface to well thought security system.


BIOMETRIC SYSTEM:

The figure (2.1) below shows a simple block diagram of a biometric system. The main operations a system can perform are enrollment and test. During the enrollment biometric information of an individual are stored in database, and during the test information are detected and compared with the stored information.





COMPONENTS OF BIOMETRIC SYSTEM:

Sensors
Pre-processing
Feature extractor
Template generator
Stored templates
Matcher
Application device



SENSOR:
The first block (sensor) is the interface between the real world (user) and our system (biometric system), it has to acquire all the necessary data. Most of the time it is an image acquisition system, but it can change according to the characteristics we want to consider.

PRE-PROCESSING:

It performs all the necessary pre-processes; it has to remove artifacts from the sensor, to enhance the input (e.g. remove some kind of noise.), to use some kind of normalization, etc.





FEATURE EXTRACTOR:
In this block all the necessary features are extracted. We have to choose which features it extract and how. Moreover we have to do it with certain efficiency (it canâ„¢t take hours). After that, we can have a vector of numbers or an image with particular properties: all those data are used to create the template.

TEMPLATE GENARATOR:
All the characteristics of the source, from extractor is being used by this block to create template.




5. STORED TEMPLATES:

If the system is performing enrollment then it is stored in this block.

6. MATCHER:

If test is on then the obtained template is simply pass through matcher, it compares it with existing templates. And the decision is sent to output.

7. APLLICATION DEVICE:

Decision taken matcher is sent to application device for further process.

ARCH pattern: In arch pattern ridges enter from one side of the finger and exits other side.



LOOP pattern: In this pattern ridges enter from one side , from a curve and tend to exit same side.




WHORL pattern: In this pattern ridges form a circular pattern in the center of the finger.




FEATURES:

Minutia based: The major minutia based features of fingerprint ridges are ridge ending, bifurcation and short point ridge.

Ridge based: Size and shape of fingerprint, number, type, and position singularities (core and deltas), spatial relationship and geometrical attributes of the ridge lines, shape features, global and local texture information, sweat pores, fractal features.






There are three types of sensors used:

Optical sensor: Optical fingerprint imaging involves a digital image capturing of the print using visible light.

Ultrasonic sensor: Ultrasonic sensor use the principles of ultrasound to create the visual image of fingerprint.

Capacitive sensors: Capacitance sensor utilize the principle of parallel plate capacitor to create the fingerprint image.


Algorithms

Pattern Based: Pattern based algorithms compare the basic of fingerprint (arch, loop, whorl) b/w a previously stored template and candidate fingerprint. This requires images be aligned in same orientation.

Minutia based algorithms: It compares several minutia points(ridge ending, bifurcation, and short ridge) extracted from originally stored template with those of candidateâ„¢s fingerprint.


Fingerprint SWAD

Strengths:
Fingerprints donâ„¢t change over time
Widely believed fingerprints are unique
Weaknesses:
Scars
Attacks:
Surgery to alter or remove prints
Finger Decapitation
Corruption of the database
Defenses:
Measure physical properties of a live finger (pulse)


CONCLUSION

Fingerprint authentication comes under biometrics and is a way fingerprints are compared and matched. Fingerprint authentication has many uses as in security purposes.
The process is simple, as in put your finger down. It does not take a security professional to realize that 10 digit password on sticky notes attached to our monitor is poor security require doing the obvious, and are often done by insiders.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: uscis fingerprint clevelaln ohio, hospital management system with fingerprint authentication pdf download, architecture of brain fingerprint, unsupported frf in fingerprint, fingerprint authentication papers 2011, fingerprint scannerspectral, iiit hyd pg,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Fingerprint authentication - by Electrical Fan - 14-12-2009, 07:16 PM
RE: Fingerprint authentication - by seminar topics - 18-03-2010, 08:33 AM
RE: Fingerprint authentication - by seminar class - 25-03-2011, 10:59 AM
RE: Fingerprint authentication - by seminar class - 25-03-2011, 03:03 PM
RE: Fingerprint authentication - by gsavya - 10-08-2011, 11:19 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  FingerPrint Based Security System seminar topics 5 8,251 10-03-2013, 05:23 PM
Last Post: Guest
  fingerprint based projects computer science technology 11 14,891 07-01-2013, 07:07 PM
Last Post: Guest
  Wavelet Based Palmprint Authentication System projectsofme 4 4,344 13-06-2012, 04:10 PM
Last Post: Naveen bille
  Personal Authentication Based on Iris Texture Analysis computer science technology 1 2,239 12-03-2012, 01:49 PM
Last Post: swethakv
  Fingerprint Based Bank Locker System full report seminar class 1 2,888 07-02-2012, 09:38 AM
Last Post: seminar addict
  bio metrics or FINGERPRINT BASED ACCESS CONTROL SECURITY SYSTEM project report helper 1 1,827 07-02-2012, 09:38 AM
Last Post: seminar addict
  A Scalable Robust Authentication Protocol For Secure Vehicular Communications smart paper boy 0 817 28-07-2011, 03:36 PM
Last Post: smart paper boy
  AN EFFICIENT IRIS AUTHENTICATION USING CHAOS THEORY BASED CRYPTOGRAPHY FOR E-COMMERCE smart paper boy 0 1,229 19-07-2011, 03:41 PM
Last Post: smart paper boy
  IMAGE AUTHENTICATION TECHNIQUES smart paper boy 0 785 18-07-2011, 03:44 PM
Last Post: smart paper boy
  Zigbee Wireless Vehicular Identification and Authentication System project report tiger 4 4,317 01-06-2011, 09:45 PM
Last Post: anjumali

Forum Jump: