0% found this document useful (0 votes)
49 views20 pages

Information Search and Analysis Skills (Isas) : "Finggerprints Sensor Architecture

This document provides an introduction to a paper analyzing fingerprint sensor architecture. It begins with background on continuing education programs and biometrics technology. The paper aims to discuss the history of biometrics, definitions, architectures, systems, and advantages/disadvantages. It will also analyze implementing biometrics for fingerprints, including the system architecture of fingerprint sensor machines. The paper is divided into four chapters covering these topics and concludes with a bibliography.

Uploaded by

putu mananitia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views20 pages

Information Search and Analysis Skills (Isas) : "Finggerprints Sensor Architecture

This document provides an introduction to a paper analyzing fingerprint sensor architecture. It begins with background on continuing education programs and biometrics technology. The paper aims to discuss the history of biometrics, definitions, architectures, systems, and advantages/disadvantages. It will also analyze implementing biometrics for fingerprints, including the system architecture of fingerprint sensor machines. The paper is divided into four chapters covering these topics and concludes with a bibliography.

Uploaded by

putu mananitia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Continuing Education Program

Center for Computing and Information Technology


Fakultas Teknik Universitas Indonesia

Information Search and Analysis Skills


(ISAS)

“FinggerPrints Sensor Architecture”

Name :

1. Ni Komang Sinta C (1610010054)


2. Rinne Ningsih (1610010023)

Faculty : Indah Ayu Yuliani, ST, MM

Semester :3

Quarter :5

Class : 3SCP

Continuing Education Program Center for Computing and Information Technology


Faculty of Engineering, University of Indonesia
2016
PREFACE

First of all, thanks to Allah SWT because of the help of Allah, writer
finished writing the papers entitled “Implementation Fingerprint on
Smartphone”.
The author say thank you for all the help and the people who help to
guide this papers. Especially for our Faculty Indah Ayu Yuliani, ST, MM as
our guide in this analysis.
In arranging this analysis, the writer truly get lots problem and
challenges but with help of many individuals, those challenges could
passed. Author also realized there are still many mistakes in process of
writing this analysis.
Because of that, the author say thank you so much to all people who
helps in the process of reporting this analysis. Then the author hope the
criticism from the readers can help the author in perfecting the next analysis.
Last but not the least hopefully, this analysis can helps the readers to gain
more knowledge about this analysis.

Depok , March 2018

Authors

1
TABLE OF CONTENTS

PREFACE ................................................................................................................. ii
TABLE OF CONTENTS ......................................................................................... iii
TABLE OF FIGURE .............................................................................................. iv
CHAPTER I INTRODUCTION
I.1. Background ...................................................................................................... 1
I.2. Writing Objective ............................................................................................ 1
I.3. Problem Domain .............................................................................................. 2
I.4. Writing Methodology ...................................................................................... 2
I.5. Writing Framework ......................................................................................... 2

CHAPTER II BASIC THEORY


II.1 History of Biometrics ...................................................................................... 4
II.2 Definition of Biometrics .................................................................................. 4
II.3 Arsitecture of Biometrics ................................................................................. 4
II.4 Biometrics System .......................................................................................... 4
II.5 Advantages and disadvantages of Biometric System ...................................... 5

CHAPTER III PROBLEM ANALYSIS


III.2 System Architecture Fingerprint Sensor Machine ............................................. 7
III.3 Example Implementation Fingerprint ............................................................... 7

CHAPTER IV CONCLUSION AND SUGGESTION


IV.1 Conclusion ......................................................................................................... 9
IV.2 Suggestion .......................................................................................................... 9

BIBLIOGRAPHY .................................................................................................... 10

2
TABLE OF FIGURE

3
CHAPTER I
INTRODUCTION

I.1 Background

The technology architecture is all devices consisting of software,


hardware and network required for testing, development, arrangement and
support of information technology applications and services. every aspect
must be run in accordance with the rules for the sake of interest.

Technologies such as Biometrics are technical terms for body


measurements and calculations. This is taken into account in the metrics
associated with human characteristics. Biometric authentication (or realistic
authentication) is used in computer science as a form of identification and
control. It is also used to attract individuals in groups under supervision.

Biometric identifiers are characteristic and scalable that are used to


label and display individuals. Biometric identifiers are often categorized as
physiological and behavioral. Physiological characteristics are related to
body shape. Examples include, but are not limited to fingerprints, palm
veins, facial recognition, DNA, palm print, hand geometry, iris recognition,
retina and odor / aroma. Behavioral characteristics are related to a person's
behavior patterns, including but not limited to rhythm types, gait, and sound.
Some researchers have coined the term behavioral to get the last biometric
class. In this ISAS will explain how the implementation of physiological
and behavior explains the general benefits of this technology, explaining the
workings, shortcomings and advantages of this technology.

I.2 Writing Objective

4
This ISAS will discuss about:

1. History of Biometric
2. Definition of Biometric
3. Arsitecture Biometrics
4. Advantages and disadvantages of Biometric Systems
5. Implementing Biometric for Fingerprint
6. System Architecture Fingerprint Sensor Machine

I.3 Problem Domain

Problem domain based on the above it can be argued formulation of


the problem “Use of Biometrics in the field of Fingerprint?”

I.4 Writing Methodology


The method used is the method of research with data collection
techniques using observations from reliable media. The Author summarize
the disadvantages and advantages. Authors also quotes some important
sentence to be loaded here.

I.5 Writing Framework


To know the description of this paper, the authors divides it into four
chapters. Each chapter in this study are interconnected between chapters
with chapter one another by systematic writing as follows:

CHAPTER I INTRODUCTION
Tell about the background, writing objective, problem domain,
writing methodology and writing framework.

CHAPTER II BASIC OF THEORY

5
Tell the history of Biometrics, Definition of Biometrics, Architecture
of Biometrics, Biometrics System, Advantages and disadvantages of
Biometric System.

CHAPTER III PROBLEM ANALYSIS


Analyzing and solve the problem that contained in problem domain

CHAPTER IV CONCLUSION AND SUGGESTION


Conclude and suggest related to ISAS.
BIBLIOGRAPHY

6
CHAPTER II
BASIC THEORY

II. 1 History of Biometric

Biometric use was first performed in 1858 in India for the purpose of
sailing. Biometrics refers to a unique method of recognizing human beings
based on one or more physical or intrinsic behaviors. In information
technology, in particular, biometrics is used as a form of identity
management access and access control. It is also used to identify individuals
in groups under supervision.

II.2 Definition Of Biometric

Biometrics are automated methods of recognizing a person based


on a physiological or behavioral characteristic. Among the features
measured are face, fingerprints, hand geometry, handwriting, iris, retinal,
vein, and voice. Biometric data are separate and distinct from personal
information. Biometric templates cannot be reverse-engineered to recreate
personal information and they cannot be stolen and used to access personal
information.

Using a unique, physical attribute of your body, such as your


fingerprint or iris, to effortlessly identify and verify that you are who you
claim to be, is the best and easiest solution in the market today. That is the
simple truth and power of Biometrics Technology today. Although
biometric technology has been around for many years, modern advances in
this emerging technology, coupled with big reductions in cost, now make
biometrics readily available and affordable to consumers, small business
owner, larger corporations and public sector agencies alike.

7
II.4 Biometrics System

Figure 1. Block diagram showing the main elements of a biometric authentication system

The first time a person uses a biometric system called registration.


During such registration, biometric information from individuals is stored.
In subsequent use, biometric information is detected and compared with
information stored at enrollment. Note that it is very important that the
storage and retrieval of such systems themselves be safe if the biometric
system is to be strong. The first block (sensor) is the interface between the
real world and the system, but has to obtain all the necessary data. Most of
the time it is an image acquisition system, but it can change according to the
desired characteristics. The second block does all the necessary pre-process:
it must remove the artifact from the sensor, to increase the input (eliminate
background noise), to use some kind of normalization, etc. In the third block
the required features are taken. This step is an important step as the correct
features need to be extracted in an optimal way. A number or image vector
with certain properties is used to create a template. Templates are syntheses
of relevant characteristics extracted from the source. Unmet biometric
measurement elements in the comparison algorithm are removed in the

8
template to reduce the file size and to protect the identity of the enrollee.
and an example of a biometric system that is a fingerprint

II.5 Advantages and disadvantages of Biometric Systems

Advantages:
1. Enhance Security
2. Reduce fraud by using difficult technologies and materials.
3. Eliminates problems caused by lost or forgetten IDs by using
physiological attributes.
4. Reduce password administration coats.
5. Replace difficult remembering password that can be shared
or observed.
6. Prevention or Time and Attendance
7. Firmly connect an individual to a transaction or even.

Disadvantages:
1. The print finger of people working in the chemical industry
is often influenced. Therefore these companies do not have to
use the authentication fingerprint mode.
2. It is found that with age, a person's voice is different. Also
when people have a flu or throat infection the sound changes
or if there is too much noise in the environment this method
may not authenticate correctly. Therefore this method cannot
be applied verification all the time.
3. For people with diabetes, the affected eye results in
differences.
4. Biometrics is an expensive security solution.

9
10
CHAPTER III
PROBLEM ANALYSIS

III.1 System Architecture Fingerprint Sensor Machine

A fingerprint sensor is an electronic device used to register a digital image


of the fingerprint pattern. The fingerprint sensor captures the relevant
fingerprint features for further processing and is therefore one of the most
central elements of the fingerprint recognition system, the others being the
image processing/feature extraction and the matching algorithms used.

Figure

Optical Scanners

Figure 2. Working principle of an optical figerprint sensor

11
Optical fingerprint scanners are the oldest method of utilizing light
when recording fingerprint patterns. The finger is placed on a scanner,
usually made of glass.

Furthermore from the bottom of the scanner, the light transmitter


illuminates the surface of the fingertips. Light reflections are captured by
the receiver so that a fingerprint image is obtained. This technique uses an
algorithm to detect unique patterns on the fingerprint surface. Then analyze
with dark areas that indicate more reflective light (hills) and bright areas
that indicate less reflective light (the valley).
However, this system has several flaws. This technology can only
capture 2D images and less secure because it can be deceived. In addition,
the fingerprint patterns obtained depend heavily on the skin condition of the
palm of the finger, if the finger is dirty or the skin is being peeled off, the
scanner may fail to recognize the fingerprint.

Capacitive Scanners

Figure 3. Capacitive Scanners

12
The most common type of fingerprint scanner technology currently used in
smart phones is the capacitive scanner, which uses ultrasonic sensors or
capacitances (capacitive).

As the name implies, these capacitance sensors use electronic devices such
as capacitors to scan fingerprints. Instead of creating a traditional image of
the fingerprint, the capacitor stores an electrical charge connected to a
conductive disc on the smart phone screen so that it can be used to track
fingerprint details.

The electrical charge on the capacitor will change slightly as the protruding
line sections of the fingerprints are affixed to the conductive disk.
Meanwhile, between the lines of prominent barely affect the capacitor.

III.2 The FingerPrint

A fingerprint is an impression left by the friction ridges of


a human finger. A friction ridge (epidermal ridge) is a raised
portion of the epidermis on the fingers and toes, the palm of the
hand or the sole of the foot. The ridges serve to amplify
vibrations triggered, for example, when fingertips brush across
an uneven surface, better transmitting the signals to sensory
nerves involved in fine texture perception. The ridges may also
assist in gripping rough surfaces and may improve surface
contact in wet conditions.

The epidermal ridges form distinctive patterns, each with


their own individual characteristics often referred to as minutiae
in biometrics and in fingerprint recognition systems. The
minutiae are highly unique for every human being and can

13
therefore be used for authentication and identification purposes.
The patterns of the epidermal ridges are of .three basic types:

 Arch:The ridges enter from one side of the finger, rise in the center
forming an arc, and then exit the other side of the finger.

 Loop:The ridges enter from one side of a finger, form a curve, and
then exit on that same side.

 Whorl: Ridges form circularly around a central point on the


finger.

The ridges start and end (end points), cross each other (crossover) and
separate(bifurcation). There are small isolated ridges between others
(islands), spaces between ridges (deltas) while individual poresin the
epidermis can also be identified.The analysis of fingerprints for matching

14
purposes generally requires the comparison of several features of the print
pattern. These include the patterns as such plus the various minutia points
described above. For successful use of some sensor technologies it is also
necessary to know the structure and properties of the human skin.

The fingerprint matching techniques in use by automatic fingerprint


recognition systems can broadly be divided into two main categories:
1. Minutiae based – The minutiae based category has its roots in the
manual fingerprint identification methods developed in the late
19thcentury. A set of minutiae were described by Sir Francis Galton
and together with the global ridge pattern classes these are the
fingerprint features used traditionally. Standardized matchers
(ISO/ANSI) work on a subset of the features (ridge endings and
bifurcations). The density of these minutiae is such that systems
using minutiae based matching require a large area of skin to work
with, thus large area sensors or swipe sensors are normally used.
2. Non-minutiae based – Non minutiae based methods are everything
else and encompass a broad range of matching principles ranging
from direct correlation of sub images to vectorizations of the ridge
flow and frequency based techniques. Sensor size, type and security
operating point (FAR level) will dictate what is viable. Other system
resources like available memory and processing power are of course
also important for selecting the best approach.
Matching algorithms combining traditional minutia + non-minutia based
approaches are often called hybrid methods.Governmental fingerprint
identification/authentication systems with large sensors are typically
ISO/ANSI minutiae matchers due to the strong requirement for vendor

15
interoperability.As sensor sizes decrease hybrid solutions become more
popular and for even smaller sensors, such as those in mobile devices, it
is not uncommon that the minutiae part is skipped entirely.

16
CHAPTER IV
CONCLUSION AND SUGGESTION

IV.1 Conclusion

Definition, history, and how to create Biometrics Technology-


based systems described above, the authors can conclude that Biometrics
technology is very easy to use and evolve according to the needs and
knowledge that continues to grow.
Biometrics is a technology used to analyze physical and human
behavior in authentication .. And there are two categories of biometric
identifiers covering physiological and behavioral characteristics.
Physiological characteristics are related to body shape and behavioral
character with one's behavior.

IV.2 Suggestion

The author's suggestion in ISAS is that future Biometrics can be


applied in all areas and everyday life.

17
BIBLOGRAPHY
[1] Chen Y., Chenb L., Tsaia M., Chiu H., Chiu J., and Chon C., “Fingerprint
Verification on Medical Image Reporting System,” Computer Journal of
Methods Programs in Biomedicine vol. 89, no. 3, pp. 282-288,2017

[2] Zhu E., Yin J., and Zhang G., “Fingerprint Matching Based on
Global Alignment of Multiple Reference Minutiae,” Computer
Journal ofPattern Recognition, vol. 38 no. 10, pp. 1685-1694, 2015.

[3] Ashraf El-Sisi, “Design and Implementation Biometric Access

Control System Using Fingerprint for Restricted Area Based on


Gabor Filter, 2011
[4]

18
19

You might also like