how to biometric fingerprint reader’s scanners work

15
How To Biometric Fingerprint Reader’s Scanners Work?

Upload: ashtopustech

Post on 19-Jul-2015

224 views

Category:

Technology


0 download

TRANSCRIPT

Introduction Of Biometric Technologies

Biometric Technologies

Biometric system is automated recognition of persons based on their biologicalor/and behavioral characteristics.

"Biometric recognition systems process biometric features of a person with the aimof confirming or rejecting that person's identity by using previously gatheredreference data. “

Biometrics can better solve the problems of access control, fraud and theft, moreand more organizations are considering biometrics a solution to their securityproblems.

Biometric System Requirements

Biometric System Fulfill the Following Requirements:

Universality: Every person have this feature

Uniqueness: No two or more people with the same featuremust exist,

Constancy: The feature does not change significantly in thecourse of time,

Collectability: The feature must be measurable orcollectable

Performance :of the system which allows for quantitativestatements with regard to identification accuracy andspeed as well as the required robustness in the face ofsystem-related factors,

Acceptability :of the system in its practical application,Fake resistance of the system, i.e. robustness against directmethods of tricking the system. Hence, for mostapplications, practical biometric systems have to performwith and at an acceptable identification accuracy andspeed.

Fingerprints are the most widely used form ofbiometric recognition system. Fingerprints areconsidered to be the best and fastest method forbiometric identification Fingerprints are generallyaccepted as human fingerprint images.Identification can functionally be split up into thefollowing three basic tasks:

Biometrics Fingerprint Recognition

• Fingerprint Scanning,• Fingerprint Classification• Fingerprint Comparison

Process Of Fingerprint Analysis

Scanning of a fingerprint image.

Image quality improvement.

Image processing.

Feature classification.

Feature extraction

Verification phase.

Fingerprint Identification Procedure

Finger-scan technology is the most commonlydeployed biometric technology, used in a broadrange of physical access and logical accessapplications. A Fingerprinting or finger-scanningtechnology is the oldest of the biometric sciencesand utilizes distinctive features of the fingerprintto identify or verify the identity of individuals.

All fingerprints have unique characteristicsand patterns. A normal fingerprint pattern ismade up of lines and spaces. These lines arecalled ridges while the spaces between theridges are called valleys. It is through thepattern of these ridges and valleys that aunique fingerprint is matched for verificationand authorization.

Steps of Finger-Scan Verification and Identification

There are many few stages involved in finger-scan verification and identification:

Fingerprint image acquisition

Image processing

Location of distinctive

Characteristics

Template creation and template matching

Biometric Fingerprint Sensor

Fingerprint sensor is an electronic device used to capture a digital image of thefingerprint pattern. The captured image is called a live scan. This live scan is digitallyprocessed to create a biometric template (a collection of extracted minutiae points)which is stored and used for matching.

Fingerprint Images

Features OF Fingerprint Scanners

Interface: Integrated FBI-compliant scanners often have analogue output and a frame grabber isnecessary to digitize the images on internal board to be mounted in the host. In non-AFIS devices,the analogue-to-digital conversion is performed by the scanner itself and the interface to the hostis usually through a simple Parallel Port or USB connection.

Frames per second: This is the number of images the scanner is able to acquire and send to thehost in a second.

Automatic finger detection: Some scanners automatically detect the presence of a finger on theacquisition surface, without requiring the host to continually grab and process frames; this allowsthe acquisition process to be automatically initiated as soon as the user’s finger touches thesensor.

Encryption: This is the securing of the communication channel between the scanner and the host.

Supported Operating systems: Compatibility with more operating systems is an importantrequirement.

Types Of Fingerprint Sensing

The most important part of a fingerprint scanner is the sensor. Sensors belong to one of the three families:

Optical SensorsFrustrated Total Internal Reflection (FTIR)FTIR with a sheet prismOptical fibersElectro-Optical

Solid-State SensorsThermalElectric fieldPiezoelectric

Ultrasound Sensors

Fingerprint Sensing Method

Fingerprint Sensing Method Basically Categories in to two ways…

Sweep Systems

Touch systems

Biometric Fingerprint Recognition Advantages & Disadvantages

Advantages

Subjects have multiple fingersEasy to use, with some trainingSome systems require little spaceLarge amounts of existing data to allow backgroundand/or watch list checksHas proven effective in many large scale systems overyears of useFingerprints are unique to each finger of eachindividual and the ridge arrangement remainspermanent during one's lifetime.

Disadvantages

Privacy concerns of criminal implicationsPublic PerceptionsHealth or societal concerns with touching a sensorused by countless individualsCollection of high quality nail-to-nail images requirestraining and skill, but current flat reader technology isvery robustAn individual’s age and occupation may cause somesensors difficulty in capturing a complete and accuratefingerprint image

Conclusion

Biometrics Fingerprint Recognitions system allows for increased security,convenience and accountability while detecting and deterring fraud. BiometricSolution one of the best & strongest security feature to benefit individuals and anyinstitutions.

Biometric Technology is very inexpensive and easy to use for many application area.

Criminal identification

Prison security

ATM

Aviation security

Border crossing controls

Database access

Home/Office

Ashtopus

Technologies

Thank You