AADHARSHILA
VIDYAPEETH
  CD-BLOCK,PITAMPURA
 PROJECT REPORT ON
FINGERPRINT SENSORS
              SUBMITTED BY:
               Nischay Verma
                       XII-D
                           1
         INDEX
S. No.   Topic          Pg. No.
   1.    Introduction      1
   2.      Principle       2
           Involved
   3.       Theory        3-4
   4.       Model          5
            Image
   5.      Working         6
   6.    Applications      7
   7.    Advantages        8
   8.    Disadvantag       9
               es
   9.     Conclusion       10
   10.   Bibliography      11
  INTRODUCTION
                                  2
  A fingerprint scanner is a type of technology
that identifies and authenticates the fingerprints
  of an individual to grant or deny access to a
     computer system or a physical facility.
It is a type of biometric security technology that
     utilizes the combination of hardware and
  software techniques to identify the fingerprint
                scans of an individual.
          PRINCIPLE
          INVOLVED
                                                 3
 The working principle of the fingerprint sensor
      mainly depends on the processing. The
    fingerprint processing mainly includes two
  elements namely enrollment and matching. In
   fingerprint enrolling, every user requires to
 place the finger twice. So that the system will
check the finger images to process as well as to
  generate a pattern of the finger and it will be
stored. When matching, a user places the finger
   using an optical sensor then the system will
produce a pattern of the finger & compares
        it with the finger library templates.
             THEORY
    There are two or three ways of scanning
 fingers. An optical scanner works by shining a
   bright light over your fingerprint and taking
    what is effectively a digital photograph. If
you’ve ever photocopied your hand, you’ll know
 exactly how this works. Instead of producing a
  dirty black photocopy, the image feeds into a
  computer scanner. The scanner uses a light-
                                                4
    sensitive microchip (either a CCD, charge-
   coupled device, or a CMOS image sensor) to
produce a digital image. The computer analyzes
    the image automatically, selecting just the
fingerprint, and then uses sophisticated pattern-
     matching software to turn it into a code.
              THEORY
Another type of scanner, known as a capacitive
    scanner, measures your finger electrically.
 When your finger rests on a surface, the ridges
 in your fingerprints touch the surface while the
 hollows between the ridges stand slightly clear
of it. In other words, there are varying distances
     between each part of your finger and the
surface below. A capacitive scanner builds up a
  picture of your fingerprint by measuring these
 distances. While capacitive scanners are faster
                                                 5
and more secure than optical ones, they don’t
work well in moisture (if your fingers are wet)
and they can be damaged by static electricity.
    MODEL IMAGE
                                                  6
            WORKING
       The sensor avails a light-penetrating
   microprocessor that can either be a charge-
   coupled device or a CCD, or a CMOS image
      sensor. In doing so, this creates a digital
 picture. Following this, the processor examines
     the image mechanically, choosing just the
    fingerprint, and then uses refined pattern-
   identical software to turn it into encryption.
 This is merely how one type of scanner works.
   In the other kind, i.e., the capacitive type of
 scanners, the scanner scans the gaps between
 our ridges. So, when a person places his or her
 hand on any object, the ridges are the part that
touches the surface. Therefore, these ridges are
logged, and the gaps distances are measured. In
    this way, the pattern is recorded. In other
    words, it means the distance between two
                                                 7
ridges that never encountered the surface is
                noted down.
    APPLICATIONS
 Fingerprint scanners are very helpful in authenticating
  & identifying an individual’s fingerprint.
 These are reliable & safe devices, so they are used for
  security authentication.
 These are used in security industries, police stations,
  mobile devices, and many more.
 These are used to provide biometric security
 These sensors are used in current IoT applications to
  add security and identify the users easily.
 These are used in smartphones, wearables, smart
  industry & smart home applications for data security &
  entry identification
 Biometrics Sensors are used in a variety of commercial
  applications like computer login, electronic data
  security, internet access, credit cards, ATMs, mobile
  phones, etc.
   Several Government applications like ID Cards,
  driver’s license, passport etc.
   Law enforcement and forensic applications like
  identification    of  culprits,    corpses, parenthood
  determination etc.
                                                        8
     ADVANTAGES
 Fingerprint sensors are much more secure because
  they are not easy to forge.
 These are very easy to use.
 No need to remember passwords because fingerprints
  are with you always.
 These are non-transferable.
 Fingerprint identification provides a higher stage of
  responsibility at work.
 These are economical.
 These are highly accurate in recognizing fingerprints.
 These are stable for a long time.
 It needs less space, and it decreases the memory
  requirement of the database.
 For every individual finger, these are unique & the
  arrangement of the ridge stays permanent during
  everyone’s lifetime.
 Fingerprint patterns are very hard to guess than
  passwords.
 Fingerprints cannot be misplaced like physical access
  cards.
 Fake identity cannot be created based on the image.
                                                       9
 DISADVANTAGES
  Costs – Significant investment needed in
   biometrics for security
• Data breaches – Biometric databases can still
be hacked
• Tracking and data – Biometric devices like
facial recognition systems can limit privacy for
users
• Bias – Machine learning and algorithms must
be very advanced to minimize biometric
demographic bias
• False positives and inaccuracy – False rejects
and false accepts can still occur preventing
select users from accessing systems
       CONCLUSION
                                              10
 The conclusion of the report is the fingerprint
 sensor authentication is the key to solve many
  problems related to fake entries and security
   attacks there seems to be some exits some
  disadvantages over the advantages for using
 fingerprint sensor this is one reason why such
     systems are yet not widely used but the
 advantages mentioned above are so important
 and people want to benefit from them that the
disadvantages will be more and more reduced in
future the fingerprint is the only biometric type
which is very easy to take handle and operated
using recent developments in image processing
                                                11
BIBLIOGRAPHY
     • www.google.com
  • www.miteksystems.com
 • www.electronicshub.org
  • www.circuitstoday.com
    • www.lifewire.com
                            12