Information Search and Analysis Skills (Isas) : "Finggerprints Sensor Architecture
Information Search and Analysis Skills (Isas) : "Finggerprints Sensor Architecture
Name :
Semester :3
Quarter :5
Class : 3SCP
First of all, thanks to Allah SWT because of the help of Allah, writer
finished writing the papers entitled “Implementation Fingerprint on
Smartphone”.
The author say thank you for all the help and the people who help to
guide this papers. Especially for our Faculty Indah Ayu Yuliani, ST, MM as
our guide in this analysis.
In arranging this analysis, the writer truly get lots problem and
challenges but with help of many individuals, those challenges could
passed. Author also realized there are still many mistakes in process of
writing this analysis.
Because of that, the author say thank you so much to all people who
helps in the process of reporting this analysis. Then the author hope the
criticism from the readers can help the author in perfecting the next analysis.
Last but not the least hopefully, this analysis can helps the readers to gain
more knowledge about this analysis.
Authors
1
TABLE OF CONTENTS
PREFACE ................................................................................................................. ii
TABLE OF CONTENTS ......................................................................................... iii
TABLE OF FIGURE .............................................................................................. iv
CHAPTER I INTRODUCTION
I.1. Background ...................................................................................................... 1
I.2. Writing Objective ............................................................................................ 1
I.3. Problem Domain .............................................................................................. 2
I.4. Writing Methodology ...................................................................................... 2
I.5. Writing Framework ......................................................................................... 2
BIBLIOGRAPHY .................................................................................................... 10
2
TABLE OF FIGURE
3
CHAPTER I
INTRODUCTION
I.1 Background
4
This ISAS will discuss about:
1. History of Biometric
2. Definition of Biometric
3. Arsitecture Biometrics
4. Advantages and disadvantages of Biometric Systems
5. Implementing Biometric for Fingerprint
6. System Architecture Fingerprint Sensor Machine
CHAPTER I INTRODUCTION
Tell about the background, writing objective, problem domain,
writing methodology and writing framework.
5
Tell the history of Biometrics, Definition of Biometrics, Architecture
of Biometrics, Biometrics System, Advantages and disadvantages of
Biometric System.
6
CHAPTER II
BASIC THEORY
Biometric use was first performed in 1858 in India for the purpose of
sailing. Biometrics refers to a unique method of recognizing human beings
based on one or more physical or intrinsic behaviors. In information
technology, in particular, biometrics is used as a form of identity
management access and access control. It is also used to identify individuals
in groups under supervision.
7
II.4 Biometrics System
Figure 1. Block diagram showing the main elements of a biometric authentication system
8
template to reduce the file size and to protect the identity of the enrollee.
and an example of a biometric system that is a fingerprint
Advantages:
1. Enhance Security
2. Reduce fraud by using difficult technologies and materials.
3. Eliminates problems caused by lost or forgetten IDs by using
physiological attributes.
4. Reduce password administration coats.
5. Replace difficult remembering password that can be shared
or observed.
6. Prevention or Time and Attendance
7. Firmly connect an individual to a transaction or even.
Disadvantages:
1. The print finger of people working in the chemical industry
is often influenced. Therefore these companies do not have to
use the authentication fingerprint mode.
2. It is found that with age, a person's voice is different. Also
when people have a flu or throat infection the sound changes
or if there is too much noise in the environment this method
may not authenticate correctly. Therefore this method cannot
be applied verification all the time.
3. For people with diabetes, the affected eye results in
differences.
4. Biometrics is an expensive security solution.
9
10
CHAPTER III
PROBLEM ANALYSIS
Figure
Optical Scanners
11
Optical fingerprint scanners are the oldest method of utilizing light
when recording fingerprint patterns. The finger is placed on a scanner,
usually made of glass.
Capacitive Scanners
12
The most common type of fingerprint scanner technology currently used in
smart phones is the capacitive scanner, which uses ultrasonic sensors or
capacitances (capacitive).
As the name implies, these capacitance sensors use electronic devices such
as capacitors to scan fingerprints. Instead of creating a traditional image of
the fingerprint, the capacitor stores an electrical charge connected to a
conductive disc on the smart phone screen so that it can be used to track
fingerprint details.
The electrical charge on the capacitor will change slightly as the protruding
line sections of the fingerprints are affixed to the conductive disk.
Meanwhile, between the lines of prominent barely affect the capacitor.
13
therefore be used for authentication and identification purposes.
The patterns of the epidermal ridges are of .three basic types:
Arch:The ridges enter from one side of the finger, rise in the center
forming an arc, and then exit the other side of the finger.
Loop:The ridges enter from one side of a finger, form a curve, and
then exit on that same side.
The ridges start and end (end points), cross each other (crossover) and
separate(bifurcation). There are small isolated ridges between others
(islands), spaces between ridges (deltas) while individual poresin the
epidermis can also be identified.The analysis of fingerprints for matching
14
purposes generally requires the comparison of several features of the print
pattern. These include the patterns as such plus the various minutia points
described above. For successful use of some sensor technologies it is also
necessary to know the structure and properties of the human skin.
15
interoperability.As sensor sizes decrease hybrid solutions become more
popular and for even smaller sensors, such as those in mobile devices, it
is not uncommon that the minutiae part is skipped entirely.
16
CHAPTER IV
CONCLUSION AND SUGGESTION
IV.1 Conclusion
IV.2 Suggestion
17
BIBLOGRAPHY
[1] Chen Y., Chenb L., Tsaia M., Chiu H., Chiu J., and Chon C., “Fingerprint
Verification on Medical Image Reporting System,” Computer Journal of
Methods Programs in Biomedicine vol. 89, no. 3, pp. 282-288,2017
[2] Zhu E., Yin J., and Zhang G., “Fingerprint Matching Based on
Global Alignment of Multiple Reference Minutiae,” Computer
Journal ofPattern Recognition, vol. 38 no. 10, pp. 1685-1694, 2015.
18
19