preview

Fingerprint Identification

Better Essays

1. INTRODUCTION In order to protect users of computer systems and to secure network-based transactions, demand is increasing for improved user authentication procedures to establish the identity of an actual user and to bar access to a terminal to anyone who is unauthorized. Personal identification using biometrics, i.e., a person’s physical or behavioral characteristics has come to attract increased attention as a possible solution to this issue and one that might offer reliable systems at a reasonable cost. While traditionally this technology has been available only with such expensive, high-end systems as those used in law enforcement and other government applications, today many personal–level applications have also become …show more content…

[pic]

Fig.1 Fingerprint-based personal Authentication

“SecureFinger”, some actual examples of fingerprint-based personal identification systems and large-scale fingerprint identification systems(AFIS). Fingerprint User Interface (FpUI), a new type of application of this technology used to enhance human-machine interactions will also be considered.

3. FINGERPRINT SENSING TECHNOLOGY:

A Fingerprint is a pattern of fine ridges and valleys (spaces between ridges) on the surface of a finger and fingerprint sensor makes a digitized image of it. The sensing resolution is 500ppi (pixel per inch; also known as 500dpi, i.e., dots per inch) in most cases, which is equivalent to 20 pixels in 1 millimeter. The obtained image size is typically in the range of between 300*300 and 512*512 pixels, which makes the area covering the fingerprint between 15 to 25 millimeters square.

FINGERPRINT SENSING TYPES:

a. Conventional prism-Type Optical Sensor

Optical sensors using a prism have long been used as a common (and formerly the only) capture device. In them, the light from an LED illuminates a finger placed on a prism and its reflected image is captured by a small, optical sensing device (e.g., a CCD or CMOS imager chip), as in Fig.2. This device operates basically on the principle of

Get Access