Комментарии:
how fingerprint information is verified code number
ОтветитьI was wondering what would be the numerical data of a fingerprint, does it use hexadecimal numbers?
Ответитьnicely explained and well -presented too..!
ОтветитьGreat video. Does anyone have some more resources (or tips how to find them) about the matching algorithm. Like finding a part of it and also when it's in another direction, how is it achieved?
Ответитьi want to see the script not you ,
ОтветитьThat is all very interesting but how does the sensor physically read your fingerprint before it starts to analyse it?
ОтветитьThe only problem with using your fingerprint as an example is someone can make a replica silicone fingertip. Not worth the effort of course, just saying.
ОтветитьOne question (maybe 4...), for some reason it become very hard to unlock my phone via fingerprint, it got so bad that I often made too many attempts and had to use a password instead. When I created a new profile it now unlocks near-instantly, so it wasn't an issue with the sensor.
Why would this happen? I can't recall any injury to my them I haven't grown and my weight is stable..
Is this a common occurrence? Do people's fingerprints Change much with age? I'd imagine the answer is yes. How is this normally managed and what are the security implications with false positives from making the algorithm more accommodating? I've had the android phone for a little over two years now.
Fingerprint sensors are great for usability and practicality, but they are a bit of a security nightmare. You can copy the fingerprint from a photo, this has been done.
ОтветитьDo not try to trick us, by putting your tablat on a stack of paper. You are violating the rules - pen and paper only!
ОтветитьI would like to know more about the alignment process, I find the speed of the match fascinating, even if i scan my finger upside down. Must be like having a partial sky chart, attempting to find where it fits on the sky.
ОтветитьIs possible to change your fingerprints with a laser operation?
ОтветитьIs it possible to restore (or build) a fingerprint image (with the same characteristics of the original fingerprint) from the fingerprint characteristics file?
ОтветитьUnfortunately I have not learned anything from this video :(
ОтветитьI'd love to see an explanation on how this data is stored and how it's matched against a finger press, especially in the context of an encrypted device.
So: how do you use a fingerprint to authenticate and decrypt the master decryption key?
Would be nice, if you could do a follow up on how the identification of interesting points on the fingerprint image works and how the matching algorithm works. Thanks for the video!
ОтветитьIf you graze your fingers will finger print recognition still work ?
ОтветитьBut how does it work.
ОтветитьI always bite the skin off my thumb when I'm nervous and then I can't unlock my phone... Let's see how you fix that, technology!
ОтветитьOh man, more of Dr. Triguero please! :D
ОтветитьGreat explanation!
ОтветитьThere have been cases of people unlocking their partner's phones whilst they are asleep by pressing their finger on the phone. Scary...
ОтветитьActually; fingerprint recognition and matching softwares using hashing techniques. They produce hashcode for each finger print and matching these hashcodes.
This guy is not telling about hashing techniques used by fingerprint recognition softwares. Thus he is misleading the programmers with useless too much information.
H
ОтветитьSponsored by Apple.
ОтветитьDelta: Δ δ Lamda: Λ λ
ОтветитьCan you do a follow-up video and explain:
- how many points are used to a match
- are these thresholds implemented differently or is there a standard
- when some fp detector is faster than others, does it mean they lower the matching threshold
- what is the likelihood of a false positive? They say our fp are unique but it sounds like there could be many overlaps when the fp matching algorithm is matching only a few characteristics.
Your fingerprint is never stored on phones, is through mathematical representations that represent your fingerprint, if these fingerprints don't match the previous representation, it will not authenticate the unauthorised person trying to access it.
Ответитьwhen's the notchproX coming out?
ОтветитьI see a lot of desperate people here who probably fear their own shadow lol. It's simple, if you have anything that's important enough to be worth the time and money to spoof your fingerprint: don't store it behind a fingerprint lock. Otherwise stop bitching about it
ОтветитьPlease do iris scanning next.
ОтветитьWhen he's pointing out the areas of interest, show those, not his face, ffs.
ОтветитьThe only problem with fingerprent scanners is that you leave the key on everything you touch lol.
ОтветитьIs there a standard algorithm of sorts for rotational and scalable feature, or rather point, matching?
i.e., given two sets of a couple of dots with coordinates, check if they are the same pattern, independent of rotation and scaling?
25643rd
ОтветитьWTF!? How come?! Would You use fingerprints in authentication process when you leave them everywhere each time yuou touch anything? It's like leaving your plain-text password that cannot be changed everywhere. I would rather protect my fingerprints from stealing and not use it for auth. D'oh!
ОтветитьStoring a copy of biometric data creates a risk of unauthorized duplication of the original data which could be used to falsely incriminate someone by replicating and then planting a copy to frame an innocent person.
A proper technique would use a one-way hash function to summarize the data so that it can be used to match later samples but can’t be used to fabricate an original copy.
They say that there's no two people on Earth exactly the same; no two faces, no two sets of fingerprints. But do they know that for sure? 'Cause they would have to get everybody in one huge space, and obviously that's impossible, even with computers.
ОтветитьFingerprints - and most other biometrics - are very poor security factors. They are too easily copied or worse, synthesised. And the authentic originals are too easily defaced.
ОтветитьCorrection: a whorl is a type of fingerprint pattern (the one that looks circular). The innermost place where the lines turn around in a loop pattern is only called core.
ОтветитьFingerprints should never be used for authentication. Only identification. If they are used for authentication, it's basically a password you are leaving everywhere an on everything you touch.
ОтветитьApple products. yuck
ОтветитьGreat video! Nice job Brady and Dr Triguero!
ОтветитьHere is an idea for a video: we're all familiar with long integers, double precision floats and whatnot, but how do computers deal with truly massive numbers, such as come from finding big primes?
ОтветитьFun fact: fingerprints are actually not at all unique. In 2004, a lawyer from Oregon was arrested because his fingerprint was found at the scene after the Madrid train bombings, but it later turned out that his fingerprint matched the one of one of the terrorists responsible. In the USA there are on average 7 people with a 12-point match between their fingerprints, which means there are around 150 people around the world that have the same fingerprint as you (within the accuracy of a 12-point test).
ОтветитьWorst authentication idea
Ответитьthe guy is so cute
Ответить'Notchprox' lol
Ответить