0% found this document useful (0 votes)
205 views12 pages

Physics Project

The document is a project report on fingerprint sensors that was submitted by a student. It includes an introduction to fingerprint scanners and how they work. The report then covers the principles, theory, model images, working, applications, advantages, and disadvantages of fingerprint sensors. It concludes that fingerprint authentication can help solve security issues but also has some disadvantages currently that may be reduced over time as the technology advances further.

Uploaded by

Nischay Verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
205 views12 pages

Physics Project

The document is a project report on fingerprint sensors that was submitted by a student. It includes an introduction to fingerprint scanners and how they work. The report then covers the principles, theory, model images, working, applications, advantages, and disadvantages of fingerprint sensors. It concludes that fingerprint authentication can help solve security issues but also has some disadvantages currently that may be reduced over time as the technology advances further.

Uploaded by

Nischay Verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

AADHARSHILA

VIDYAPEETH
CD-BLOCK,PITAMPURA

PROJECT REPORT ON
FINGERPRINT SENSORS

SUBMITTED BY:
Nischay Verma
XII-D

1
INDEX
S. No. Topic Pg. No.
1. Introduction 1
2. Principle 2
Involved
3. Theory 3-4
4. Model 5
Image
5. Working 6
6. Applications 7
7. Advantages 8
8. Disadvantag 9
es
9. Conclusion 10
10. Bibliography 11

INTRODUCTION
2
A fingerprint scanner is a type of technology
that identifies and authenticates the fingerprints
of an individual to grant or deny access to a
computer system or a physical facility.
It is a type of biometric security technology that
utilizes the combination of hardware and
software techniques to identify the fingerprint
scans of an individual.

PRINCIPLE
INVOLVED
3
The working principle of the fingerprint sensor
mainly depends on the processing. The
fingerprint processing mainly includes two
elements namely enrollment and matching. In
fingerprint enrolling, every user requires to
place the finger twice. So that the system will
check the finger images to process as well as to
generate a pattern of the finger and it will be
stored. When matching, a user places the finger
using an optical sensor then the system will
produce a pattern of the finger & compares
it with the finger library templates.

THEORY
There are two or three ways of scanning
fingers. An optical scanner works by shining a
bright light over your fingerprint and taking
what is effectively a digital photograph. If
you’ve ever photocopied your hand, you’ll know
exactly how this works. Instead of producing a
dirty black photocopy, the image feeds into a
computer scanner. The scanner uses a light-
4
sensitive microchip (either a CCD, charge-
coupled device, or a CMOS image sensor) to
produce a digital image. The computer analyzes
the image automatically, selecting just the
fingerprint, and then uses sophisticated pattern-
matching software to turn it into a code.

THEORY

Another type of scanner, known as a capacitive


scanner, measures your finger electrically.
When your finger rests on a surface, the ridges
in your fingerprints touch the surface while the
hollows between the ridges stand slightly clear
of it. In other words, there are varying distances
between each part of your finger and the
surface below. A capacitive scanner builds up a
picture of your fingerprint by measuring these
distances. While capacitive scanners are faster
5
and more secure than optical ones, they don’t
work well in moisture (if your fingers are wet)
and they can be damaged by static electricity.

MODEL IMAGE

6
WORKING
The sensor avails a light-penetrating
microprocessor that can either be a charge-
coupled device or a CCD, or a CMOS image
sensor. In doing so, this creates a digital
picture. Following this, the processor examines
the image mechanically, choosing just the
fingerprint, and then uses refined pattern-
identical software to turn it into encryption.
This is merely how one type of scanner works.
In the other kind, i.e., the capacitive type of
scanners, the scanner scans the gaps between
our ridges. So, when a person places his or her
hand on any object, the ridges are the part that
touches the surface. Therefore, these ridges are
logged, and the gaps distances are measured. In
this way, the pattern is recorded. In other
words, it means the distance between two

7
ridges that never encountered the surface is
noted down.

APPLICATIONS
 Fingerprint scanners are very helpful in authenticating
& identifying an individual’s fingerprint.
 These are reliable & safe devices, so they are used for
security authentication.
 These are used in security industries, police stations,
mobile devices, and many more.
 These are used to provide biometric security
 These sensors are used in current IoT applications to
add security and identify the users easily.
 These are used in smartphones, wearables, smart
industry & smart home applications for data security &
entry identification
 Biometrics Sensors are used in a variety of commercial
applications like computer login, electronic data
security, internet access, credit cards, ATMs, mobile
phones, etc.
 Several Government applications like ID Cards,
driver’s license, passport etc.
 Law enforcement and forensic applications like
identification of culprits, corpses, parenthood
determination etc.

8
ADVANTAGES
 Fingerprint sensors are much more secure because
they are not easy to forge.
 These are very easy to use.
 No need to remember passwords because fingerprints
are with you always.
 These are non-transferable.
 Fingerprint identification provides a higher stage of
responsibility at work.
 These are economical.
 These are highly accurate in recognizing fingerprints.
 These are stable for a long time.
 It needs less space, and it decreases the memory
requirement of the database.
 For every individual finger, these are unique & the
arrangement of the ridge stays permanent during
everyone’s lifetime.
 Fingerprint patterns are very hard to guess than
passwords.
 Fingerprints cannot be misplaced like physical access
cards.
 Fake identity cannot be created based on the image.

9
DISADVANTAGES

 Costs – Significant investment needed in


biometrics for security
• Data breaches – Biometric databases can still
be hacked
• Tracking and data – Biometric devices like
facial recognition systems can limit privacy for
users
• Bias – Machine learning and algorithms must
be very advanced to minimize biometric
demographic bias
• False positives and inaccuracy – False rejects
and false accepts can still occur preventing
select users from accessing systems

CONCLUSION
10
The conclusion of the report is the fingerprint
sensor authentication is the key to solve many
problems related to fake entries and security
attacks there seems to be some exits some
disadvantages over the advantages for using
fingerprint sensor this is one reason why such
systems are yet not widely used but the
advantages mentioned above are so important
and people want to benefit from them that the
disadvantages will be more and more reduced in
future the fingerprint is the only biometric type
which is very easy to take handle and operated
using recent developments in image processing

11
BIBLIOGRAPHY

• www.google.com
• www.miteksystems.com
• www.electronicshub.org
• www.circuitstoday.com
• www.lifewire.com

12

You might also like