Touch Based &Touch-less
Fingerprint
Recognition System
(A New Dimension in Fingerprint Technology)
Presented By :
Name: Palak Pandoh
Branch: MCAr
Semester: IVth 7th
 Introduction
 Biometrics – Expectations and Reality.
 Fingerprint – What Else?
 Advantages of Biometrics
 Processes.
 Security Aspects
 Fingerprints
 Touch-Based Technology
 Disadvantages of Touch-Based Technology
 Touch-less Fingerprint Recognition Technology
 Touch-less Technology Basics
 Advantages of Touch-less 3D Technology
 Markets and Applications.
 Comparative Study
Overview
Touch less-fingerprint-recognition-system (1)
Biometrics:
Biometrics refers to
the identification of
Humans by their
characteristics or
traits.
Biometrics is used in
computer science as a
form of identification
and access control.
Expectations & Reality
Biometrics is key to solve security challenges of the 21th century
#Reality or Fiction?
• PRO:
– Makes secure identification possible, eliminates weak identification
– Unique, constant and always available
– Flexible, can be adapted to situation and user group
– Can be combined with other systems to increase security
– Convenient and User friendly
• CONTRA:
– Some technologies not mature yet
– Market consolidation has just started
– Not deterministic, identification based on probabilities
Biometrics is just one aspect of a sophisticated security concept!
Fingerprint – What Else?
Fingerprint
most adopted technology
Fingerprint is unique, constant
and can be captured fast &
easily.
Fingerprint still takes more
than 50% of market share!
A fingerprint consists of
patterns of ridges and valleys
on the surface of a fingertip.
Biometric Processes :
Enrollment (User registration)
– User data registration and capturing of biometric reference data
('Reference Template')
– crucial importance for overall system performance.
Matching (User identification or verification)
– Comparison of live captured sample with reference data.
– Verification (1:1)
• requires second token to pre-select user list.
• comparison against pre-selected biometric data only.
• lower requirements regarding system accuracy and speed.
– Identification (1:N)
• no pre-selection.
• comparison against reference data of all users.
• high requirements regarding system accuracy and speed.
Security Aspects
A system is as secure as its weakest part!
– Biometrics is part of a total security solution
– Must not limit system security
Risk factors:
• Data Security
– Secure data storage
– Secure data transfer
– Can biometric data be interpreted and repeated?
– Can biometric data be revoked?
• Process Security
– Is biometric process stable?
– Is biometric process safe against spoofing?
Fingerprints
A fingerprint consists of
patterns of ridges and valleys
on the surface of a fingertip.
Each individual has
fingerprint which is different
from the other.
Fingerprint recognition
system is an identification
system that can be an
Automated Fingerprint
Identification System (AFIS)
or a Non-automated
Fingerprint Recognition
System.
Touch-Based Fingerprint
Recognition System
Most of the sensors available today use
“touch” method since it is simple and little
training is required. These touch sensors
acquire fingerprint images as the user’s
fingerprint is contacted on a solid flat sensor.
Both the sensor method and ink-technique
requires the person to press his/her finger
against a flat rigid surface. For this reason
they are known as touch-based methods.
Conventional fingerprint systems are simple
and require less processing as compared to
the touch-less fingerprint recognition system,
but they suffer from several problems like
hygienic user interface, maintenance and
latent fingerprints that are invisible from
naked eyes and important for law enforcement
agencies.
Disadvantages of Touch Based Sensors
 Problem of contamination which occurs because of placing the fingertip over
the same interface which is already used by other. This produces a low
quality fingerprint image.
 Due to contact pressure, which creates physical distortions which are usually
non-linear in arbitrary direction and strength. Moreover, the distortion
occurs globally, while its deformation parameters could be different locally in
a single fingerprint image. Figure shows the fingerprint image of one
fingertip but with different minutiae because of physical pressure.
Touch-less Technology Basics
3 cameras surrounding the
finger
Finger imaging instead of
Finger printing
Full-3D and Approx-3D
variants, depending on
application
Full-3D to create rolled
equivalent fingerprints
Compliant to 2D technology
(touch-based)
Approx-3D to extend and
optimize center image
Advantages of Touch-less 3D Technology
 Superior image quality
- No Failure-To-Enroll
- Able to handle critical fingers
 Unparallel image stability
– Non-intrusive capturing process
– Almost not affected by finger condition
 Larger capture area
– Full-3D is able to provide almost nail-to-nail images
– Approx-3D captures significantly bigger area than touch sensors
– More indications available than just fingerprint
 Build-in user guidance
– Self-learning experience
– Avoids sensor misuse
 Mature Life Finger Detection
Consequence:
Better matching performance Higher Process Security
Markets and Applications
 Access Control and Time & Attendance
– Early adopter of new technologies
– Small to medium sized applications
– Targets mainly on single factor identification
– Networked environment
 Biometric (sub)system required, rather than sensors
 Focus on Process Security
 Civil, Governmental and Criminal ID
– Long term business
– Large sized applications
– Targets mainly on AFIS infrastructures
– PC based environment
 High-Quality biometric sensors required
 Focus on Data Security
The main modules of a fingerprint recognition system are:
a) fingerprint sensing, in which the fingerprint of an individual is acquired
by a fingerprint scanner to produce a raw digital representation;
b) preprocessing, in which the input fingerprint is enhanced and adapted to
simplify the task of feature extraction;
c)feature extraction, in which the fingerprint is further processed to
generate discriminative properties, also called feature vectors; and
d) matching, in which the feature vector of the input fingerprint is
compared against one or more existing templates.
The templates of approved users of the biometric system, also called clients,
are usually stored in a database.
Clients can claim an identity and their fingerprints can be checked against
stored fingerprints.
Steps Involved:
Thank You.

More Related Content

PDF
Touchless and less-constrained 3D fingerprint recognition
PDF
Fingerprint Based Biometric ATM Authentication System
PDF
Project Synopsis
PPT
Bio atm with-microsoft_finger_print_sdk
PDF
FINGERPRINT BASED ATM SYSTEM
PDF
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
PDF
Case study on Usage of Biometrics (Cryptography)
PDF
Biometric System and Recognition Authentication and Security Issues
Touchless and less-constrained 3D fingerprint recognition
Fingerprint Based Biometric ATM Authentication System
Project Synopsis
Bio atm with-microsoft_finger_print_sdk
FINGERPRINT BASED ATM SYSTEM
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
Case study on Usage of Biometrics (Cryptography)
Biometric System and Recognition Authentication and Security Issues

What's hot (20)

PPTX
BIOMETRIC SECURITY SYSTEM
PDF
IRJET- Eye Tracking for Password Authentication using Machine Learning
DOC
Bm 01 FINGERPRINT BASED AUTHENTICATION SYSTEM
DOC
Poster on biometrics
PPTX
Contactless and less-constrained palmprint recognition - Ph.D. presentation
DOC
Bm 03 Fingerprint Based Attendance and Exam Hall Exam Paper Set Generation Sy...
PPTX
Biometric authentication reiew
PPT
Ubiquitous security- is it just biometrics?
PPTX
Introduction to biometric systems security
PPTX
Biometric Systems and Security
PPT
Biometrics
PDF
Improved authentication using arduino based voice
PDF
IRJET - Door Lock Control using Wireless Biometric
PPTX
Keystroke dynamics
PDF
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
PDF
RFID Based Smart Class Attendance System with Absentees using Face verification
PDF
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
PPTX
Securing Mobile Cloud Using Fingerprint Authentication
PDF
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
BIOMETRIC SECURITY SYSTEM
IRJET- Eye Tracking for Password Authentication using Machine Learning
Bm 01 FINGERPRINT BASED AUTHENTICATION SYSTEM
Poster on biometrics
Contactless and less-constrained palmprint recognition - Ph.D. presentation
Bm 03 Fingerprint Based Attendance and Exam Hall Exam Paper Set Generation Sy...
Biometric authentication reiew
Ubiquitous security- is it just biometrics?
Introduction to biometric systems security
Biometric Systems and Security
Biometrics
Improved authentication using arduino based voice
IRJET - Door Lock Control using Wireless Biometric
Keystroke dynamics
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
RFID Based Smart Class Attendance System with Absentees using Face verification
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
Securing Mobile Cloud Using Fingerprint Authentication
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
Ad

Similar to Touch less-fingerprint-recognition-system (1) (20)

PDF
Touchless Fingerprint Recognition
PPTX
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
PDF
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
PPT
BSI Biometrics Standards Presentation
PDF
Biometrics/fingerprint sensors
DOCX
Fingerprint detection
PPT
PPT
Biomatrics
DOC
Biometrics for e-voting
PPTX
Security
PPTX
Embedded system
PPS
Ranjith_Bm
PPTX
Face Recognition System
PDF
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
PDF
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
PDF
Implementation of Biometric Based Electoral Fraud Desisting System
PPTX
AI Approach for Iris Biometric Recognition Using a Median Filter
PDF
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
DOCX
GANNON UNIVERSITYELECTR.docx
PDF
Fingerprint recognition using minutiae based feature
Touchless Fingerprint Recognition
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
BSI Biometrics Standards Presentation
Biometrics/fingerprint sensors
Fingerprint detection
Biomatrics
Biometrics for e-voting
Security
Embedded system
Ranjith_Bm
Face Recognition System
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
Implementation of Biometric Based Electoral Fraud Desisting System
AI Approach for Iris Biometric Recognition Using a Median Filter
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
GANNON UNIVERSITYELECTR.docx
Fingerprint recognition using minutiae based feature
Ad

Recently uploaded (20)

PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PPTX
Computer Architecture Input Output Memory.pptx
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Trump Administration's workforce development strategy
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
20th Century Theater, Methods, History.pptx
PDF
International_Financial_Reporting_Standa.pdf
PDF
advance database management system book.pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
IGGE1 Understanding the Self1234567891011
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
Computer Architecture Input Output Memory.pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Trump Administration's workforce development strategy
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
20th Century Theater, Methods, History.pptx
International_Financial_Reporting_Standa.pdf
advance database management system book.pdf
What if we spent less time fighting change, and more time building what’s rig...
Paper A Mock Exam 9_ Attempt review.pdf.
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
IGGE1 Understanding the Self1234567891011
A powerpoint presentation on the Revised K-10 Science Shaping Paper

Touch less-fingerprint-recognition-system (1)

  • 1. Touch Based &Touch-less Fingerprint Recognition System (A New Dimension in Fingerprint Technology) Presented By : Name: Palak Pandoh Branch: MCAr Semester: IVth 7th
  • 2.  Introduction  Biometrics – Expectations and Reality.  Fingerprint – What Else?  Advantages of Biometrics  Processes.  Security Aspects  Fingerprints  Touch-Based Technology  Disadvantages of Touch-Based Technology  Touch-less Fingerprint Recognition Technology  Touch-less Technology Basics  Advantages of Touch-less 3D Technology  Markets and Applications.  Comparative Study Overview
  • 4. Biometrics: Biometrics refers to the identification of Humans by their characteristics or traits. Biometrics is used in computer science as a form of identification and access control.
  • 5. Expectations & Reality Biometrics is key to solve security challenges of the 21th century #Reality or Fiction? • PRO: – Makes secure identification possible, eliminates weak identification – Unique, constant and always available – Flexible, can be adapted to situation and user group – Can be combined with other systems to increase security – Convenient and User friendly • CONTRA: – Some technologies not mature yet – Market consolidation has just started – Not deterministic, identification based on probabilities Biometrics is just one aspect of a sophisticated security concept!
  • 6. Fingerprint – What Else? Fingerprint most adopted technology Fingerprint is unique, constant and can be captured fast & easily. Fingerprint still takes more than 50% of market share! A fingerprint consists of patterns of ridges and valleys on the surface of a fingertip.
  • 7. Biometric Processes : Enrollment (User registration) – User data registration and capturing of biometric reference data ('Reference Template') – crucial importance for overall system performance. Matching (User identification or verification) – Comparison of live captured sample with reference data. – Verification (1:1) • requires second token to pre-select user list. • comparison against pre-selected biometric data only. • lower requirements regarding system accuracy and speed. – Identification (1:N) • no pre-selection. • comparison against reference data of all users. • high requirements regarding system accuracy and speed.
  • 8. Security Aspects A system is as secure as its weakest part! – Biometrics is part of a total security solution – Must not limit system security Risk factors: • Data Security – Secure data storage – Secure data transfer – Can biometric data be interpreted and repeated? – Can biometric data be revoked? • Process Security – Is biometric process stable? – Is biometric process safe against spoofing?
  • 9. Fingerprints A fingerprint consists of patterns of ridges and valleys on the surface of a fingertip. Each individual has fingerprint which is different from the other. Fingerprint recognition system is an identification system that can be an Automated Fingerprint Identification System (AFIS) or a Non-automated Fingerprint Recognition System.
  • 10. Touch-Based Fingerprint Recognition System Most of the sensors available today use “touch” method since it is simple and little training is required. These touch sensors acquire fingerprint images as the user’s fingerprint is contacted on a solid flat sensor. Both the sensor method and ink-technique requires the person to press his/her finger against a flat rigid surface. For this reason they are known as touch-based methods. Conventional fingerprint systems are simple and require less processing as compared to the touch-less fingerprint recognition system, but they suffer from several problems like hygienic user interface, maintenance and latent fingerprints that are invisible from naked eyes and important for law enforcement agencies.
  • 11. Disadvantages of Touch Based Sensors  Problem of contamination which occurs because of placing the fingertip over the same interface which is already used by other. This produces a low quality fingerprint image.  Due to contact pressure, which creates physical distortions which are usually non-linear in arbitrary direction and strength. Moreover, the distortion occurs globally, while its deformation parameters could be different locally in a single fingerprint image. Figure shows the fingerprint image of one fingertip but with different minutiae because of physical pressure.
  • 12. Touch-less Technology Basics 3 cameras surrounding the finger Finger imaging instead of Finger printing Full-3D and Approx-3D variants, depending on application Full-3D to create rolled equivalent fingerprints Compliant to 2D technology (touch-based) Approx-3D to extend and optimize center image
  • 13. Advantages of Touch-less 3D Technology  Superior image quality - No Failure-To-Enroll - Able to handle critical fingers  Unparallel image stability – Non-intrusive capturing process – Almost not affected by finger condition  Larger capture area – Full-3D is able to provide almost nail-to-nail images – Approx-3D captures significantly bigger area than touch sensors – More indications available than just fingerprint  Build-in user guidance – Self-learning experience – Avoids sensor misuse  Mature Life Finger Detection Consequence: Better matching performance Higher Process Security
  • 14. Markets and Applications  Access Control and Time & Attendance – Early adopter of new technologies – Small to medium sized applications – Targets mainly on single factor identification – Networked environment  Biometric (sub)system required, rather than sensors  Focus on Process Security  Civil, Governmental and Criminal ID – Long term business – Large sized applications – Targets mainly on AFIS infrastructures – PC based environment  High-Quality biometric sensors required  Focus on Data Security
  • 15. The main modules of a fingerprint recognition system are: a) fingerprint sensing, in which the fingerprint of an individual is acquired by a fingerprint scanner to produce a raw digital representation; b) preprocessing, in which the input fingerprint is enhanced and adapted to simplify the task of feature extraction; c)feature extraction, in which the fingerprint is further processed to generate discriminative properties, also called feature vectors; and d) matching, in which the feature vector of the input fingerprint is compared against one or more existing templates. The templates of approved users of the biometric system, also called clients, are usually stored in a database. Clients can claim an identity and their fingerprints can be checked against stored fingerprints. Steps Involved: