SlideShare a Scribd company logo
1 of 61
Download to read offline
Biometric Technology
-- Finger Print Business Opportunity
Team Members:
YANG QIAN A0147178W
LIM KIM CHYE A0147179U
QUEK YONG GUAN A0147276X
SONG ZHIWEI A0026195E For information on other technologies see
http://www.slideshare.net/Funk98/presentations
2
Technology Overview
Applications
PerformanceHardware/Software
Cost Analysis
Entrepreneur
Opportunity
Recommendation SystemFinger Print Technology
3
• A biometric identification system provides an automated method
of recognizing an individual based on their unique physiological
characteristics
 Metrics related to human characteristics
 These metrics are Distinctive and Measurable (label
and describe individuals)
What is Biometric?
4
Why Biometric?
• Traditional, security is by what we:
–Know (PIN, Password)
–Have (Key, smart card)
• Both of these security measures can be hacked, stolen, forgotten,
duplicated and have too many.
• Modern, security is by we:
–Are (Body)
• It is not easy to create a copy because its unique and high
accuracy.
5
Type of Biometric?
1. Finger print
2. Palm veins
3. DNA
4. Iris recognition
5. Facial recognition
6. Voice recognition
7. Signature recognition
8. Palm print
9. Hand geometry
10.Retina scan
11.Ordure/Scent
https://en.wikipedia.org/wiki/Biometrics
6
Comparison Between Biometric
Biometric Technology Accuracy Cost Device Required Social
Acceptability
DNA High High Test Equipment Low
Iris recognition High High Camera Medium -Low
Retina scan High High Camera Low
Facial recognition Medium -
Low
Medium Camera High
Voice recognition Medium Medium Microphone,
telephone
High
Hand geometry Medium -
Low
Low Scanner High
Finger print High Medium Scanner Medium
Signature recognition Low Medium Optic pen,
touch panel
High
http://kaitleencrowe.com/2015/01/22/biometric/
• Compared with other Bio Technologies, Finger Print is the best choice
Uniqueness Finger Skin Pattern
PANKANTI, S., PRABHAKAR, S., AND JAIN, A. K. On the individuality of fingerprints. IEEE Trans. Pattern Anal. Mach. Intell. 24 (August 2002), 1010–
1025. Available from: http://portal.acm.org/citation. cfm?id=605089.605091. 204, 212
• Human finger skin consists of friction ridges with pores.
• These ridges are formed in the ninth week of a fetal
development life, and remains the same all life long.
• A severely injured skin may be reconstructed to the same
as before.
• Identical twins have different fingerprints and no two
people have the same fingerprint.
• Every individual’s fingerprint is highly unique and suitable
for use as a form of authentication.
8
Fingerprint Security
• Deny Intruders
– Higher Accuracy computation
• 97% will return correct results
• Prevent Re-construction of fingerprint data
– Image protection
• Minutiae is retrieved and template created
– Encrypted data
– Image destruction
• Cannot reconstruct the fingerprint from data
• Fake Fingerprints Detection
– Ignore Latent Print Residue
• Cannot steal from previous user
– Detect fake/amputated finger
• Sensors detect presences of
– Temperature, Pulse, Heartbeat sensors, Blood flow
9
Technology Overview
Applications
PerformanceHardware/Software
Cost Analysis
Entrepreneur
Opportunity
Recommendation SystemFinger Print Technology
How Fingerprint are acquired?
Source: http://360biometrics.com/faq/fingerprint_scanners.php
Optical Sensor
Ultrasonic with RF Sensor
Optical Sensor
module
Capacitive Sensor
Thermal Sensor
Optical Fingerprint Sensors
Problem:
1. Scratched or dirty touch
surface can cause bad image
2. Easily fooled by fake finger
3. Bulky design, only suitable for
larger static installation
Function:
1. Reflected image of fingerprint captured by
camera from the underside of a prism.
2. Image is stored for comparison with
database.
Capacitive Fingerprint Sensing
http://appleinsider.com/articles/13/08/07/apple-inc-gets-its-
fingerprints-on-advanced-touch-sensor-appears-difficult-for-android-
to-copy
Ridge
Valley
Ultrasonic Fingerprint Imaging
http://www.sonavation.com/ultrasound-biometric-sensor/
https://youtu.be/FtKKZyYbZtw (1:30)
14
Fingerprint Sensors Comparison
Optical Capacitive Ultrasound
Size Relatively big and
require camera
Can embed into
small devices
Can embed into
small devices
Method Image capture RF Field RF Field
Cost Middle Low High
Accuracy May be affected
by dirt or water
May be affected
by dirt or water
Will not be
affected by dirt or
water
Working Current 120 mA 200 mA 6 µA
Source: http://yourbusiness.azcentral.com/comparison-fingerprint-scanners-27754.html
http://artofcircuits.com/product/optical-fingerprint-sensor-module-fpm10a
http://www.techshinobiometrics.com/products/fingerprint-identification-products/fingerprint-oem-modules/
http://www.sonavation.com/ultrasound-biometric-sensor
Examples of Commercial Fingerprint
Scanners
http://perso.telecom-paristech.fr/~chollet/Biblio/Cours/Biomet/fribourg/maltoni_1.pdf
*The standard fingerprint image
resolution in law enforcement
applications is 500 pixels per inch
(ppi) Ppi = Dpi
16
3 Levels of Fingerprint classification
1. Loops ,Arches , or Whorls
2. Individual characteristic (Minutiae)
http://shs2.westport.k12.ct.us/forensics/04-fingerprints/fingerprints_handout.htm
17
3 Levels of Fingerprint classification
3. Pores and Ridges
1 Pores and Ridges: Fingerprint Matching Using Level 3 Features
by Jain, A; Yi Chen; Demirkus, M
2 Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features
by Jain, A.K; Yi Chen; Demirkus, M
18
Basic Idea
• After these classification, a key is generated by the software algorithm.
• After finger print reader read your fingerprint, software will compare
with database.
http://gizmodo.com/apple-finally-explains-touch-id-security-in-detail-1532298901
Scan and Classify Generate a unique
user Key
Unlock access
19
Cryptography
• There is two keys:
Public key
Private key (Fingerprint key)
• The basic idea is:
 Sender encrypts data with his receiver’s public key and send out.
 Receiver will use his/her private key to decrypt the data. No one
can decrypt without receiver’s private key!
http://gizmodo.com/apple-finally-explains-touch-id-security-in-detail-1532298901
Mathematically Linked
20
Software Algorithm
• Software Classification
• http://shs2.westport.k12.ct.us/forensics/04-fingerprints/fingerprints_handout.htm
• http://www.bioelectronix.com/what_is_biometrics.html
Fingerprint Matching Software
• The most commonly used are:
1. Minutiae matching (commonly used)
2. Pattern matching
http://www.biometric-solutions.com/solutions/index.php?story=fingerprint_recognition
http://biometrics.mainguet.org/types/fingerprint/fingerprint_algo.htm
Advance Minutiae Based Algorithm (AMBA)
• Two processes
1. Feature Extractor
2. Matcher
http://www.supremasolution.com/
AMBA – Feature Extractor
• Feature Extractor
– Capture Image
– Enhance Ridge (Normalization, Local orientation estimation,
Local frequency estimation, Region mask estimation and
filtering)
– Extract Minutiae (Classification)
http://http://www.supremasolution.com/
http://www.cse.iitk.ac.in/users/biometrics/pages/finger.htm
AMBA - Matcher
• Matcher
– Used to match fingerprint
– Trade-off between speed and performance
– Group minutiae and categorize by 12 types
• Large number of certain type can result in faster searches
http://www.supremasolution.com/
Example: Apple ID touch
• Secure Enclave - using its microprocessor (A7)
to create protection to user’s data
• When device is locked:
– Data protection keys are wrapped (encapsulated)
– Data are not accessible
• When device is unlocked by the fingerprint
sensor:
– Data protection key are unwrapped (decapsulated)
– Iphone is unlocked and data is accessible
http://gizmodo.com/apple-finally-explains-touch-id-
security-in-detail-1532298901
How Fingerprint Biometric is used
• Enrollment
– Storing of fingerprint in
database
• Verification
– Known Identification of
person
– Compare the person’s
fingerprint in database
– One to one comparison
• Identification
–Unknown Identification of
person
– Search through database
for a match
– One to many comparison
Source: An Introduction to Biometric Recognition, Anil K. Jain, Fellow, IEEE, Arun Ross, Member, IEEE, and Salil Prabhakar, Member, IEEE, January 2004
27
Technology Overview
Applications
PerformanceSoftware
Cost Analysis
Entrepreneur
Opportunity
Recommendation SystemFinger Print Technology
Optical Resolution vs Accuracy
http://biolab.korea.ac.kr/pubs/JainFpMatching_IEEEComp10.pdf
Jain, Feng, Nandakumar, Anil K. Kain, Jianjiang Fengm Karthik Nandakumar, 2010. Fingerprint Matching. Computer, 0018-9162, 36-44.
[a] http://itlaw.wikia.com/wiki/False_non-match_rate
[b] http://itlaw.wikia.com/wiki/False_match_rate
False Non-Match Rate (FNMR) is the failure of a biometric system to identify a biometric
subject or to verify the legitimate claimed identity of a biometric subject.
False Match Rate (FMR) is the proportion of the completed biometric non-match
comparison trials that result in a false match. [b]
False Positive Identification Rate (FPIR) occurs when the system finds a hit for a query
fingerprint that is not enrolled in the system.
False Negative Identification Rate (FNIR) occurs when it finds no hit or a wrong hit for
a query fingerprint enrolled in the system.
Image quality vs EER (4 software algorithm)
Image quality is important, better image, lower EER
Source: Incorporating Image Quality in Multi-algorithm Fingerprint Verification by Julian Fierrez-Aguilar, Yi Chen, Javier Ortega-Garcia, and Anil K.
Jain.
ATVS, Escuela Politecnica Superior, Universidad Autonoma de Madrid, Avda. Francisco Tomas y Valiente, 11 Campus de Cantoblanco 28049 Madrid,
Spain {julian.fierrez, avier.ortega}@uam.es. Department of Computer Science and Engineering, Michigan State University, East Lansing, MI 48823,
USA
Equalerrorrate(thelower,thebetter)
Low Q Image Vs High Q Image (FRR & FAR)
Source: Incorporating Image Quality in Multi-algorithm Fingerprint Verification by Julian Fierrez-Aguilar, Yi Chen, Javier Ortega-Garcia, and Anil K.
Jain.
ATVS, Escuela Politecnica Superior, Universidad Autonoma de Madrid, Avda. Francisco Tomas y Valiente, 11 Campus de Cantoblanco 28049 Madrid,
Spain {julian.fierrez, avier.ortega}@uam.es. Department of Computer Science and Engineering, Michigan State University, East Lansing, MI 48823,
Ideal Ideal
Sensor Duration vs FAR&FRR
http://www.neurotechnology.com/fingerprint-scanner-biometrika-fx-2000.html
Fingerprint Sensing Techniques, Devices and Applications Rahul Singh kingtiny@cs.cmu.edu 30th April 2003
Test data
1. Database of 100 users
(non-experts)
2. Low quality fingerprints
Efficiency
TASK SPEED_DEFAULT SPEED_FAST
Feature extraction 350 ms 260 ms
Matching 120 ms 47 ms
Identity verification 470 ms 307 ms
Accuracy:
Time taken
SPEED_DEFAULT SPEED_FAST
FAR FRR FAR FRR
0.3500 0.0049 (0.49%) 0.0005 (0.05%) 0.0032 (0.32%) 0.0009 (0.09%)
0.3750 0.0025 (0.25%) 0.0010 (0.10%) 0.0014 (0.14%) 0.0014 (0.14%)
0.4000 0.0011 (0.11%) 0.0014 (0.14%) 0.0005 (0.05%) 0.0020 (0.20%)
0.4250 0.0006 (0.06%) 0.0019 (0.19%) 0.0002 (0.02%) 0.0034 (0.34%)
0.4500 0.0004 (0.04%) 0.0026 (0.26%) 0.0000 (0.00%) 0.0049 (0.49%)
0.4750 0.0000 (0.00%) 0.0036 (0.36%) 0.0000 (0.00%) 0.0063 (0.63%)
FX2000 Optical Sensor Specification:
Resolution: 569 ppi,
Image Size: 296 x 570 pixels
Device size: 122 x 73 x 61mm
False Acceptance rate (FAR) is the
probability that the system incorrectly
authorizes a non-authorized person,
due to incorrectly matching.
False Rejection Rate (FRR) is the
probability that the system incorrectly
rejects access to an authorized person,
due to failing to match
32
Microprocessor Improvements
• Size reduced, Speed increasing, Power consumption
http://www.futuretimeline.net/subject/computers-internet.htm
+http://www.singularity.com/charts/page61.html
http://www.androidauthority.com/smartphone-hardware-2015-405022/
Technology Enabler for Finger-print Authentication in
Mobile phone
• High-resolution sensors
–Capture higher resolution fingerprint data
• Micro-Processors
–Higher Processor Speed
• Storage Capacity
–Higher storage in mobile devices
• Smaller Form Factor
–Can be installed in mobile devices
GAFUROV, D., BOURS, P., YANG, B., AND BUSCH, C. Guc100 multi-scanner fingerprint database for inhouse (semi-public) performance and
interoperability evaluation. Computational Science and its Applications, International Conference (2010), 303–306. 203, 212
34
Technology Overview
Applications
HardwareSoftware
Cost Analysis
Entrepreneur
Opportunity
Recommendation SystemFinger Print Technology
35
Camera Based finger print sensor cost analysis
https://en.wikipedia.org/wiki/Touch_ID
http://www.imore.com/how-touch-id-works
http://biometrics.mainguet.org/types/fingerprint/fingerprint_sensors_manufacture.htm
Component Cost:
1. Finger Print sensor 53%
2. Cover glass 10%
3. Processing assembly 18%
4. Metal Rim 12%
5. F-PCB Component 7%
Key components:
1. laser-cut sapphire crystal
2. stainless steel detection ring
3. Touch ID CMOS sensor
4. Tactile Switch
36
http://biometrics.mainguet.org/types/fingerprint/fingerprint_sensors_manufacture.htm
Key component
-- Finger Print Sensor Volume vs ASP
• Finger print sensor price drop rapidly with high demanding growth in future
37
https://www.tractica.com/newsroom/press-releases/fingerprint-readers-in-mobile-devices-to-surpass-1-billion-unit-shipments-annually-by-2021/
Finger Print Sensor Market Demand
• High demanding forecast for fingerprint sensor, especially in Asian market.
Which can reduce fingerprint sensor manufacturing cost
38
Key component
-- Display Cover glass demand
http://www.ledinside.com/intelligence/2014/6/wearable_devices_to_spur_sapphire_market_demands_in_2015_analyzes_ledinside
http://electroiq.com/blog/2015/07/smartphone-and-tablets-still-drive-demand-for-cover-glass-as-industry-looks-to-smart-watches-for-growth/
 The major market demand
growth is from smart phone
cover glass
 Display Cover glass demand
keep increasing in past 3
years and market demand is
keep increasing until 2019
39
Key component
-- Sapphire Cost Forecast
http://www.i-micronews.com/component/hikashop/product/sapphire-applications-market-2015-from-led-to-consumer-electronic.html
• Sapphire is a major material for display cover, especially for hand phone camera cover and finger print
sensor cover. The overall price from different manufacturing process is keep going down.
Biometric Market Trends – Fingerprint Scanners
40Source: http://www.bloomberg.com/news/articles/2013-08-22/apple-iphone-rumor-boosts-biometrics-companies
Patents - Fingerprint Sensing
41
Fingerprint Sensors Patent Landscape
New strong IP enthusiasm and new players such as Apple are leaving their imprint on the market
Publication Jan. 2015
42
Technology Overview
Applications
HardwareSoftware
Cost Analysis
Entrepreneur
Opportunity
Recommendation SystemFinger Print Technology
Consumer Acceptance to Fingerprint Authentication
• A Survey was conducted in 2010 on 278 Students on their
acceptance level to use fingerprint for authentication
– 58% of respondents had used fingerprint for authentication
(Notebook, facility access, etc.).
– Feedback on the likely services that they would use fingerprint
authentication
Biometrictechnologyinretailing:Willconsumersaccept fingerprintauthentication? Richard Clodfelter Department
ofRetailing,TheCollegeofHospitality,Retail,&SportManagement,UniversityofSouthCarolina,SC29208Columbia,UnitedStates
44
Summary of Fingerprint Applications
-- Changing Lifestyle
• People are willing to use fingerprint technology instead of traditional way in
daily life, this is because fingerprint technology is reliable and convenient.
• Lifestyle is changing with fingerprint technology widespread used and hand
phone is a major base of this technology.
Without fingerprint With fingerprint
Mobile Phone based Applications
-- Unlock hand phone
• Since security concern, Apple and some other companies change hand phone
password from 4 number to 6 number which means users need longer time to unlock
their hand phone.
• Unlock your phone with fingerprint to save time. Hand Phone can be unlock while you
press home bottom
• Hand phone integrate reliable technology -- fingerprint function is a key to open the door
of new lifestyle.
Mobile Phone based Applications
-- Fingerprint technology in Banking
Bank Branch Bank Mobile APP
• People save time and easily to manage their bank account
by hand phone
• Banks can reduce No. of branches which means lower cost
for banks.
47
https://www.linkedin.com/pulse/biometrics-banking-
hussain-
Mobile Phone based Applications
-- Fingerprint Technology in Banking
• Compared with other Biometrics
technologies, fingerprint
technology widely used in
banking
• Asian and US are largest market
in fingerprint banking.
48
Mobile Phone based Applications
-- Mobile Bill Payment
AXS machine AXS online
• Without fingerprint, people don’t want to pay bill by mobile
phone, although some App have function of bill payment,
people are not willing to save credit card info in those App.
They have big concern on safety!
• With Fingerprint, people can pay bill by Mobile phone without
safety concern.
49
Mobile Phone based Applications
-- Mobile Manage Stock
Buy/Sell at Stock market Buy/Sell on Handphone
• More easier to manage your Stock
account by hand phone. Fingerprint
replace password, Safer than password
based online Stock.
Mobile Phone based Applications
-- Online Shopping
Traditional shopping Online shopping
• Same concern on online shopping, people are not willing to purchase
stuff from online store.
• Fingerprint can solve this issue
51
Applications on Automotive
https://www.youtube.com/watch?v=-PWbpZSBIGA
Car locker Car engine start
https://www.youtube.com/watch?v=xVXPpFpPWyU
• Use fingerprint to unlock Car or start engine are safer than current
practice, without car owner’s fingerprint, door unable to unlock and engine
unable to start.
52
Applications on Security
-- Locker, Which one your want?
https://www.youtube.com/watch?v=b
mkrLvTJj1M
Door locker with Finger print sensor
Traditional door locker
People willing to change traditional locker to
fingerprint one, there are some benefits:
1. No need bring key
2. More safer than traditional locker
53
https://www.youtube.com/watch?v=qVfddmIj_zU
USB storage with Finger print locker
Applications on Security
-- Data storage, Which one your want?
• Data storage with fingerprint function is
more safer for critical data storage.
Especially for individual privacy high
confidential information
54
Applications on sports and exercise
-- Simulators
HealthcareSport simulator
Detect grip pattern:
1. Sportsman
2. Patients
55
Technology Overview
Applications
HardwareSoftware
Cost Analysis
Entrepreneur
Opportunity
Recommendation SystemFinger Print Technology
56
Entrepreneur Opportunity
Payment
$$$
Public Transport Convenient Stores
Vending
Machines
Computers
57
Entrepreneur Opportunity
Gyms
Defence
Banks
Airports
Data storage
Homes/ offices
Automobiles
58
Entrepreneur Opportunity
Sports
Newborn babies
Healthcare group
59
Recommendation
• Protect information
• Passwords not reliable - easy to forget
• Fingerprints used for centuries
• Fingerprints are unique - can verify
• Accurate
• Many applications were developed
• Lot of business opportunities
Thank you
References
• http://info-tech.com.sg/fingerprint-
readers.htm?gclid=CJ230sCexMsCFdGKaAod7HMKzQ
• http://www.entrepreneur.com/article/168946
• http://airccj.org/CSCP/vol3/csit3504.pdf

More Related Content

What's hot

Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
Piyush Mittal
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 

What's hot (20)

Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGY
 
Thesis presentation ist
Thesis presentation istThesis presentation ist
Thesis presentation ist
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 

Viewers also liked

Viewers also liked (11)

Teleportation
TeleportationTeleportation
Teleportation
 
Perimeter security systems
Perimeter security systemsPerimeter security systems
Perimeter security systems
 
Quantum teleportation
Quantum teleportationQuantum teleportation
Quantum teleportation
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
Abstract chameleon chip
Abstract chameleon chipAbstract chameleon chip
Abstract chameleon chip
 
Quantum teleportation.ppt
Quantum teleportation.pptQuantum teleportation.ppt
Quantum teleportation.ppt
 
4D_Presentation
4D_Presentation4D_Presentation
4D_Presentation
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
chameleon chip
chameleon chipchameleon chip
chameleon chip
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
 

Similar to Biometrics/fingerprint sensors

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 

Similar to Biometrics/fingerprint sensors (20)

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
I017335457
I017335457I017335457
I017335457
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 

More from Jeffrey Funk

More from Jeffrey Funk (20)

The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
 
Commercialization of Science: What has changed and what can be done to revit...
Commercialization of Science:  What has changed and what can be done to revit...Commercialization of Science:  What has changed and what can be done to revit...
Commercialization of Science: What has changed and what can be done to revit...
 
2000, 2008, 2022: It is hard to avoid the parallels How Big Will the 2022 S...
2000, 2008, 2022: It is hard to avoid the parallels How Big Will the 2022 S...2000, 2008, 2022: It is hard to avoid the parallels How Big Will the 2022 S...
2000, 2008, 2022: It is hard to avoid the parallels How Big Will the 2022 S...
 
The Slow Growth of AI: The State of AI and Its Applications
The Slow Growth of AI: The State of AI and Its ApplicationsThe Slow Growth of AI: The State of AI and Its Applications
The Slow Growth of AI: The State of AI and Its Applications
 
Behind the Slow Growth of AI: Failed Moonshots, Unprofitable Startups, Error...
Behind the Slow Growth of AI: Failed Moonshots, Unprofitable Startups, Error...Behind the Slow Growth of AI: Failed Moonshots, Unprofitable Startups, Error...
Behind the Slow Growth of AI: Failed Moonshots, Unprofitable Startups, Error...
 
The Troubled Future of Startups and Innovation: Webinar for London Futurists
The Troubled Future of Startups and Innovation: Webinar for London FuturistsThe Troubled Future of Startups and Innovation: Webinar for London Futurists
The Troubled Future of Startups and Innovation: Webinar for London Futurists
 
Where are the Next Googles and Amazons? They should be here by now
Where are the Next Googles and Amazons? They should be here by nowWhere are the Next Googles and Amazons? They should be here by now
Where are the Next Googles and Amazons? They should be here by now
 
What's behind technological hype
What's behind technological hypeWhat's behind technological hype
What's behind technological hype
 
Irrational Exuberance: A Tech Crash is Coming
Irrational Exuberance: A Tech Crash is ComingIrrational Exuberance: A Tech Crash is Coming
Irrational Exuberance: A Tech Crash is Coming
 
Ride Sharing, Congestion, and the Need for Real Sharing
Ride Sharing, Congestion, and the Need for Real SharingRide Sharing, Congestion, and the Need for Real Sharing
Ride Sharing, Congestion, and the Need for Real Sharing
 
End of Science
End of ScienceEnd of Science
End of Science
 
Importance of Science, by Industry
Importance of Science, by IndustryImportance of Science, by Industry
Importance of Science, by Industry
 
beyond patents:scholars of innovation use patenting as an indicator of innova...
beyond patents:scholars of innovation use patenting as an indicator of innova...beyond patents:scholars of innovation use patenting as an indicator of innova...
beyond patents:scholars of innovation use patenting as an indicator of innova...
 
Lighting, Lasers, and Their Econoimcs
Lighting, Lasers, and Their EconoimcsLighting, Lasers, and Their Econoimcs
Lighting, Lasers, and Their Econoimcs
 
Putting Context Back Into Learning
Putting Context Back Into LearningPutting Context Back Into Learning
Putting Context Back Into Learning
 
Technology Change, Creative Destruction, and Economic Feasibilty
Technology Change, Creative Destruction, and Economic FeasibiltyTechnology Change, Creative Destruction, and Economic Feasibilty
Technology Change, Creative Destruction, and Economic Feasibilty
 
AI and Future of Professions
AI and Future of ProfessionsAI and Future of Professions
AI and Future of Professions
 
Solow's Computer Paradox and the Impact of AI
Solow's Computer Paradox and the Impact of AISolow's Computer Paradox and the Impact of AI
Solow's Computer Paradox and the Impact of AI
 
What does innovation today tell us about tomorrow?
What does innovation today tell us about tomorrow?What does innovation today tell us about tomorrow?
What does innovation today tell us about tomorrow?
 
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...Creative destrution, Economic Feasibility, and Creative Destruction: The Case...
Creative destrution, Economic Feasibility, and Creative Destruction: The Case...
 

Recently uploaded

Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
lizamodels9
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂EscortCall Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
dlhescort
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 

Recently uploaded (20)

Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂EscortCall Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 

Biometrics/fingerprint sensors

  • 1. Biometric Technology -- Finger Print Business Opportunity Team Members: YANG QIAN A0147178W LIM KIM CHYE A0147179U QUEK YONG GUAN A0147276X SONG ZHIWEI A0026195E For information on other technologies see http://www.slideshare.net/Funk98/presentations
  • 3. 3 • A biometric identification system provides an automated method of recognizing an individual based on their unique physiological characteristics  Metrics related to human characteristics  These metrics are Distinctive and Measurable (label and describe individuals) What is Biometric?
  • 4. 4 Why Biometric? • Traditional, security is by what we: –Know (PIN, Password) –Have (Key, smart card) • Both of these security measures can be hacked, stolen, forgotten, duplicated and have too many. • Modern, security is by we: –Are (Body) • It is not easy to create a copy because its unique and high accuracy.
  • 5. 5 Type of Biometric? 1. Finger print 2. Palm veins 3. DNA 4. Iris recognition 5. Facial recognition 6. Voice recognition 7. Signature recognition 8. Palm print 9. Hand geometry 10.Retina scan 11.Ordure/Scent https://en.wikipedia.org/wiki/Biometrics
  • 6. 6 Comparison Between Biometric Biometric Technology Accuracy Cost Device Required Social Acceptability DNA High High Test Equipment Low Iris recognition High High Camera Medium -Low Retina scan High High Camera Low Facial recognition Medium - Low Medium Camera High Voice recognition Medium Medium Microphone, telephone High Hand geometry Medium - Low Low Scanner High Finger print High Medium Scanner Medium Signature recognition Low Medium Optic pen, touch panel High http://kaitleencrowe.com/2015/01/22/biometric/ • Compared with other Bio Technologies, Finger Print is the best choice
  • 7. Uniqueness Finger Skin Pattern PANKANTI, S., PRABHAKAR, S., AND JAIN, A. K. On the individuality of fingerprints. IEEE Trans. Pattern Anal. Mach. Intell. 24 (August 2002), 1010– 1025. Available from: http://portal.acm.org/citation. cfm?id=605089.605091. 204, 212 • Human finger skin consists of friction ridges with pores. • These ridges are formed in the ninth week of a fetal development life, and remains the same all life long. • A severely injured skin may be reconstructed to the same as before. • Identical twins have different fingerprints and no two people have the same fingerprint. • Every individual’s fingerprint is highly unique and suitable for use as a form of authentication.
  • 8. 8 Fingerprint Security • Deny Intruders – Higher Accuracy computation • 97% will return correct results • Prevent Re-construction of fingerprint data – Image protection • Minutiae is retrieved and template created – Encrypted data – Image destruction • Cannot reconstruct the fingerprint from data • Fake Fingerprints Detection – Ignore Latent Print Residue • Cannot steal from previous user – Detect fake/amputated finger • Sensors detect presences of – Temperature, Pulse, Heartbeat sensors, Blood flow
  • 10. How Fingerprint are acquired? Source: http://360biometrics.com/faq/fingerprint_scanners.php Optical Sensor Ultrasonic with RF Sensor Optical Sensor module Capacitive Sensor Thermal Sensor
  • 11. Optical Fingerprint Sensors Problem: 1. Scratched or dirty touch surface can cause bad image 2. Easily fooled by fake finger 3. Bulky design, only suitable for larger static installation Function: 1. Reflected image of fingerprint captured by camera from the underside of a prism. 2. Image is stored for comparison with database.
  • 14. 14 Fingerprint Sensors Comparison Optical Capacitive Ultrasound Size Relatively big and require camera Can embed into small devices Can embed into small devices Method Image capture RF Field RF Field Cost Middle Low High Accuracy May be affected by dirt or water May be affected by dirt or water Will not be affected by dirt or water Working Current 120 mA 200 mA 6 µA Source: http://yourbusiness.azcentral.com/comparison-fingerprint-scanners-27754.html http://artofcircuits.com/product/optical-fingerprint-sensor-module-fpm10a http://www.techshinobiometrics.com/products/fingerprint-identification-products/fingerprint-oem-modules/ http://www.sonavation.com/ultrasound-biometric-sensor
  • 15. Examples of Commercial Fingerprint Scanners http://perso.telecom-paristech.fr/~chollet/Biblio/Cours/Biomet/fribourg/maltoni_1.pdf *The standard fingerprint image resolution in law enforcement applications is 500 pixels per inch (ppi) Ppi = Dpi
  • 16. 16 3 Levels of Fingerprint classification 1. Loops ,Arches , or Whorls 2. Individual characteristic (Minutiae) http://shs2.westport.k12.ct.us/forensics/04-fingerprints/fingerprints_handout.htm
  • 17. 17 3 Levels of Fingerprint classification 3. Pores and Ridges 1 Pores and Ridges: Fingerprint Matching Using Level 3 Features by Jain, A; Yi Chen; Demirkus, M 2 Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features by Jain, A.K; Yi Chen; Demirkus, M
  • 18. 18 Basic Idea • After these classification, a key is generated by the software algorithm. • After finger print reader read your fingerprint, software will compare with database. http://gizmodo.com/apple-finally-explains-touch-id-security-in-detail-1532298901 Scan and Classify Generate a unique user Key Unlock access
  • 19. 19 Cryptography • There is two keys: Public key Private key (Fingerprint key) • The basic idea is:  Sender encrypts data with his receiver’s public key and send out.  Receiver will use his/her private key to decrypt the data. No one can decrypt without receiver’s private key! http://gizmodo.com/apple-finally-explains-touch-id-security-in-detail-1532298901 Mathematically Linked
  • 20. 20 Software Algorithm • Software Classification • http://shs2.westport.k12.ct.us/forensics/04-fingerprints/fingerprints_handout.htm • http://www.bioelectronix.com/what_is_biometrics.html
  • 21. Fingerprint Matching Software • The most commonly used are: 1. Minutiae matching (commonly used) 2. Pattern matching http://www.biometric-solutions.com/solutions/index.php?story=fingerprint_recognition http://biometrics.mainguet.org/types/fingerprint/fingerprint_algo.htm
  • 22. Advance Minutiae Based Algorithm (AMBA) • Two processes 1. Feature Extractor 2. Matcher http://www.supremasolution.com/
  • 23. AMBA – Feature Extractor • Feature Extractor – Capture Image – Enhance Ridge (Normalization, Local orientation estimation, Local frequency estimation, Region mask estimation and filtering) – Extract Minutiae (Classification) http://http://www.supremasolution.com/ http://www.cse.iitk.ac.in/users/biometrics/pages/finger.htm
  • 24. AMBA - Matcher • Matcher – Used to match fingerprint – Trade-off between speed and performance – Group minutiae and categorize by 12 types • Large number of certain type can result in faster searches http://www.supremasolution.com/
  • 25. Example: Apple ID touch • Secure Enclave - using its microprocessor (A7) to create protection to user’s data • When device is locked: – Data protection keys are wrapped (encapsulated) – Data are not accessible • When device is unlocked by the fingerprint sensor: – Data protection key are unwrapped (decapsulated) – Iphone is unlocked and data is accessible http://gizmodo.com/apple-finally-explains-touch-id- security-in-detail-1532298901
  • 26. How Fingerprint Biometric is used • Enrollment – Storing of fingerprint in database • Verification – Known Identification of person – Compare the person’s fingerprint in database – One to one comparison • Identification –Unknown Identification of person – Search through database for a match – One to many comparison Source: An Introduction to Biometric Recognition, Anil K. Jain, Fellow, IEEE, Arun Ross, Member, IEEE, and Salil Prabhakar, Member, IEEE, January 2004
  • 28. Optical Resolution vs Accuracy http://biolab.korea.ac.kr/pubs/JainFpMatching_IEEEComp10.pdf Jain, Feng, Nandakumar, Anil K. Kain, Jianjiang Fengm Karthik Nandakumar, 2010. Fingerprint Matching. Computer, 0018-9162, 36-44. [a] http://itlaw.wikia.com/wiki/False_non-match_rate [b] http://itlaw.wikia.com/wiki/False_match_rate False Non-Match Rate (FNMR) is the failure of a biometric system to identify a biometric subject or to verify the legitimate claimed identity of a biometric subject. False Match Rate (FMR) is the proportion of the completed biometric non-match comparison trials that result in a false match. [b] False Positive Identification Rate (FPIR) occurs when the system finds a hit for a query fingerprint that is not enrolled in the system. False Negative Identification Rate (FNIR) occurs when it finds no hit or a wrong hit for a query fingerprint enrolled in the system.
  • 29. Image quality vs EER (4 software algorithm) Image quality is important, better image, lower EER Source: Incorporating Image Quality in Multi-algorithm Fingerprint Verification by Julian Fierrez-Aguilar, Yi Chen, Javier Ortega-Garcia, and Anil K. Jain. ATVS, Escuela Politecnica Superior, Universidad Autonoma de Madrid, Avda. Francisco Tomas y Valiente, 11 Campus de Cantoblanco 28049 Madrid, Spain {julian.fierrez, avier.ortega}@uam.es. Department of Computer Science and Engineering, Michigan State University, East Lansing, MI 48823, USA Equalerrorrate(thelower,thebetter)
  • 30. Low Q Image Vs High Q Image (FRR & FAR) Source: Incorporating Image Quality in Multi-algorithm Fingerprint Verification by Julian Fierrez-Aguilar, Yi Chen, Javier Ortega-Garcia, and Anil K. Jain. ATVS, Escuela Politecnica Superior, Universidad Autonoma de Madrid, Avda. Francisco Tomas y Valiente, 11 Campus de Cantoblanco 28049 Madrid, Spain {julian.fierrez, avier.ortega}@uam.es. Department of Computer Science and Engineering, Michigan State University, East Lansing, MI 48823, Ideal Ideal
  • 31. Sensor Duration vs FAR&FRR http://www.neurotechnology.com/fingerprint-scanner-biometrika-fx-2000.html Fingerprint Sensing Techniques, Devices and Applications Rahul Singh kingtiny@cs.cmu.edu 30th April 2003 Test data 1. Database of 100 users (non-experts) 2. Low quality fingerprints Efficiency TASK SPEED_DEFAULT SPEED_FAST Feature extraction 350 ms 260 ms Matching 120 ms 47 ms Identity verification 470 ms 307 ms Accuracy: Time taken SPEED_DEFAULT SPEED_FAST FAR FRR FAR FRR 0.3500 0.0049 (0.49%) 0.0005 (0.05%) 0.0032 (0.32%) 0.0009 (0.09%) 0.3750 0.0025 (0.25%) 0.0010 (0.10%) 0.0014 (0.14%) 0.0014 (0.14%) 0.4000 0.0011 (0.11%) 0.0014 (0.14%) 0.0005 (0.05%) 0.0020 (0.20%) 0.4250 0.0006 (0.06%) 0.0019 (0.19%) 0.0002 (0.02%) 0.0034 (0.34%) 0.4500 0.0004 (0.04%) 0.0026 (0.26%) 0.0000 (0.00%) 0.0049 (0.49%) 0.4750 0.0000 (0.00%) 0.0036 (0.36%) 0.0000 (0.00%) 0.0063 (0.63%) FX2000 Optical Sensor Specification: Resolution: 569 ppi, Image Size: 296 x 570 pixels Device size: 122 x 73 x 61mm False Acceptance rate (FAR) is the probability that the system incorrectly authorizes a non-authorized person, due to incorrectly matching. False Rejection Rate (FRR) is the probability that the system incorrectly rejects access to an authorized person, due to failing to match
  • 32. 32 Microprocessor Improvements • Size reduced, Speed increasing, Power consumption http://www.futuretimeline.net/subject/computers-internet.htm +http://www.singularity.com/charts/page61.html http://www.androidauthority.com/smartphone-hardware-2015-405022/
  • 33. Technology Enabler for Finger-print Authentication in Mobile phone • High-resolution sensors –Capture higher resolution fingerprint data • Micro-Processors –Higher Processor Speed • Storage Capacity –Higher storage in mobile devices • Smaller Form Factor –Can be installed in mobile devices GAFUROV, D., BOURS, P., YANG, B., AND BUSCH, C. Guc100 multi-scanner fingerprint database for inhouse (semi-public) performance and interoperability evaluation. Computational Science and its Applications, International Conference (2010), 303–306. 203, 212
  • 35. 35 Camera Based finger print sensor cost analysis https://en.wikipedia.org/wiki/Touch_ID http://www.imore.com/how-touch-id-works http://biometrics.mainguet.org/types/fingerprint/fingerprint_sensors_manufacture.htm Component Cost: 1. Finger Print sensor 53% 2. Cover glass 10% 3. Processing assembly 18% 4. Metal Rim 12% 5. F-PCB Component 7% Key components: 1. laser-cut sapphire crystal 2. stainless steel detection ring 3. Touch ID CMOS sensor 4. Tactile Switch
  • 36. 36 http://biometrics.mainguet.org/types/fingerprint/fingerprint_sensors_manufacture.htm Key component -- Finger Print Sensor Volume vs ASP • Finger print sensor price drop rapidly with high demanding growth in future
  • 37. 37 https://www.tractica.com/newsroom/press-releases/fingerprint-readers-in-mobile-devices-to-surpass-1-billion-unit-shipments-annually-by-2021/ Finger Print Sensor Market Demand • High demanding forecast for fingerprint sensor, especially in Asian market. Which can reduce fingerprint sensor manufacturing cost
  • 38. 38 Key component -- Display Cover glass demand http://www.ledinside.com/intelligence/2014/6/wearable_devices_to_spur_sapphire_market_demands_in_2015_analyzes_ledinside http://electroiq.com/blog/2015/07/smartphone-and-tablets-still-drive-demand-for-cover-glass-as-industry-looks-to-smart-watches-for-growth/  The major market demand growth is from smart phone cover glass  Display Cover glass demand keep increasing in past 3 years and market demand is keep increasing until 2019
  • 39. 39 Key component -- Sapphire Cost Forecast http://www.i-micronews.com/component/hikashop/product/sapphire-applications-market-2015-from-led-to-consumer-electronic.html • Sapphire is a major material for display cover, especially for hand phone camera cover and finger print sensor cover. The overall price from different manufacturing process is keep going down.
  • 40. Biometric Market Trends – Fingerprint Scanners 40Source: http://www.bloomberg.com/news/articles/2013-08-22/apple-iphone-rumor-boosts-biometrics-companies
  • 41. Patents - Fingerprint Sensing 41 Fingerprint Sensors Patent Landscape New strong IP enthusiasm and new players such as Apple are leaving their imprint on the market Publication Jan. 2015
  • 43. Consumer Acceptance to Fingerprint Authentication • A Survey was conducted in 2010 on 278 Students on their acceptance level to use fingerprint for authentication – 58% of respondents had used fingerprint for authentication (Notebook, facility access, etc.). – Feedback on the likely services that they would use fingerprint authentication Biometrictechnologyinretailing:Willconsumersaccept fingerprintauthentication? Richard Clodfelter Department ofRetailing,TheCollegeofHospitality,Retail,&SportManagement,UniversityofSouthCarolina,SC29208Columbia,UnitedStates
  • 44. 44 Summary of Fingerprint Applications -- Changing Lifestyle • People are willing to use fingerprint technology instead of traditional way in daily life, this is because fingerprint technology is reliable and convenient. • Lifestyle is changing with fingerprint technology widespread used and hand phone is a major base of this technology.
  • 45. Without fingerprint With fingerprint Mobile Phone based Applications -- Unlock hand phone • Since security concern, Apple and some other companies change hand phone password from 4 number to 6 number which means users need longer time to unlock their hand phone. • Unlock your phone with fingerprint to save time. Hand Phone can be unlock while you press home bottom • Hand phone integrate reliable technology -- fingerprint function is a key to open the door of new lifestyle.
  • 46. Mobile Phone based Applications -- Fingerprint technology in Banking Bank Branch Bank Mobile APP • People save time and easily to manage their bank account by hand phone • Banks can reduce No. of branches which means lower cost for banks.
  • 47. 47 https://www.linkedin.com/pulse/biometrics-banking- hussain- Mobile Phone based Applications -- Fingerprint Technology in Banking • Compared with other Biometrics technologies, fingerprint technology widely used in banking • Asian and US are largest market in fingerprint banking.
  • 48. 48 Mobile Phone based Applications -- Mobile Bill Payment AXS machine AXS online • Without fingerprint, people don’t want to pay bill by mobile phone, although some App have function of bill payment, people are not willing to save credit card info in those App. They have big concern on safety! • With Fingerprint, people can pay bill by Mobile phone without safety concern.
  • 49. 49 Mobile Phone based Applications -- Mobile Manage Stock Buy/Sell at Stock market Buy/Sell on Handphone • More easier to manage your Stock account by hand phone. Fingerprint replace password, Safer than password based online Stock.
  • 50. Mobile Phone based Applications -- Online Shopping Traditional shopping Online shopping • Same concern on online shopping, people are not willing to purchase stuff from online store. • Fingerprint can solve this issue
  • 51. 51 Applications on Automotive https://www.youtube.com/watch?v=-PWbpZSBIGA Car locker Car engine start https://www.youtube.com/watch?v=xVXPpFpPWyU • Use fingerprint to unlock Car or start engine are safer than current practice, without car owner’s fingerprint, door unable to unlock and engine unable to start.
  • 52. 52 Applications on Security -- Locker, Which one your want? https://www.youtube.com/watch?v=b mkrLvTJj1M Door locker with Finger print sensor Traditional door locker People willing to change traditional locker to fingerprint one, there are some benefits: 1. No need bring key 2. More safer than traditional locker
  • 53. 53 https://www.youtube.com/watch?v=qVfddmIj_zU USB storage with Finger print locker Applications on Security -- Data storage, Which one your want? • Data storage with fingerprint function is more safer for critical data storage. Especially for individual privacy high confidential information
  • 54. 54 Applications on sports and exercise -- Simulators HealthcareSport simulator Detect grip pattern: 1. Sportsman 2. Patients
  • 56. 56 Entrepreneur Opportunity Payment $$$ Public Transport Convenient Stores Vending Machines Computers
  • 59. 59 Recommendation • Protect information • Passwords not reliable - easy to forget • Fingerprints used for centuries • Fingerprints are unique - can verify • Accurate • Many applications were developed • Lot of business opportunities