Information Search and Analysis Skills (ISAS) Implementation of Advanced Encryption Standard (AES)

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 28

Information Search and Analysis Skills

(ISAS)
Implementation of Advanced Encryption Standard (AES)

Name : 1. Zeri Candra Lesmana


2. Ruby Hilalfalah

Faculty : M. Octaviano Pratama S.Kom


Semester : 4rd

Gedung Pascasarjana Lt. 3 Fakultas Teknik Universitas Indonesia


Kampus Baru UI Depok 16424
PREFACE

Praise and huge thanks to Allah for giving us blessings, health and ability to be able to
complete this ISAS, without any of it we probably won’t be able to accomplish it in
predetermined time. There are a few topic options that were put into consideration, but only
one catches our eyes, based on the implementation fingerprint security system theme that was
given, is Implementation of Fingerprint Security System on Fingerprint Screen Lock Redmi
Note 3.

Efforts are certainly needed in the process of making this assignment. We faced quite
a few difficulties but we managed to go through it by keep searching how to do this and that
over the internet, books, and even asking somebody who is well talented in the industry that
we asked for. From that lesson and on, we learned to always seek and ask information to
enhance more knowledge.

Depok, May 2017

Authors

ii
CONTENTS

PREFACE..................................................................................................................................................................... ii
TABLE OF FIGURES.............................................................................................................................................. iv
CHAPTER I................................................................................................................................................................. 1
INTRODUCTION...................................................................................................................................................... 1
I.1 Background........................................................................................................................................................ 1
I.2 Writing Objective............................................................................................................................................. 1
I.3 Problem Domain............................................................................................................................................... 2
I.4 Writing Methodology...................................................................................................................................... 2
I.5 Writing Framework.......................................................................................................................................... 2
CHAPTER II................................................................................................................................................................ 3
BASIC THEORY........................................................................................................................................................ 3
II.1 Biometric.......................................................................................................................................................... 3
II.2 History FingerPrints....................................................................................................................................... 6
II.3 Fingerprint Recognition................................................................................................................................ 8
II.3.1 Fingerprint Patterns............................................................................................................................. 8
II.3.2 Fingerprint Readers.............................................................................................................................. 9
II.4 Fingerprint Identification Algorithm....................................................................................................... 12
CHAPTER III............................................................................................................................................................ 15
PROBLEM ANALYSIS......................................................................................................................................... 15
III.1 Fingerprint Screen Lock for Android..................................................................................................... 15
III.2 Using Fingerprint Screen Lock for Redmi Note 3.............................................................................. 16
III.2.1 Steps to use the Fingerprint scanner on Xiaomi Redmi Note 3......................................16
III.3 Security System of Fingerprint Screen Lock for Redmi Note 3......................................................18
III.4 Advantages and Disadvantages of Fingerprint App Lock for Android..........................................19
CHAPTER IV............................................................................................................................................................ 20
CONCLUSION AND SUGGESTION................................................................................................................ 20
IV.1 Conclusion.................................................................................................................................................... 20
IV.2 Suggestion.................................................................................................................................................... 20
BIBLIOGRAPHY.................................................................................................................................................... 21

iii
TABLE OF FIGURES

Figure 2.1.1 Fingerprint Biometric............................................................................................4


Figure 2.1.2 Iris Biometric.........................................................................................................5
Figure 2.1.3 Face Biometric.......................................................................................................5
Figure 2.1.4 Voice Biometric.....................................................................................................5
Figure 2.1.5 Hand Biometric.....................................................................................................6
Figure 2.1.6 Retina Biometric....................................................................................................6
Figure 2.2.1.1 Arch Pattern …………………………………………………..………….…....7
Figure 2.2.1.2 Loop Pattern.......................................................................................................8
Figure 2.2.1.3 Whorl Pattern ………………………………..………..….……...……..…..…8
Figure 2.2.2.1 Fingerprint Minutiae Point.................................................................................9
Figure 2.2.2.2 Fingerprint Reading..........................................................................................10
Figure 2.2.2.3 CCD..................................................................................................................10
Figure 2.2.2.4 CMOS...............................................................................................................11
Figure 2.2.2.5 Ultrasound Biometric Sensor............................................................................12
Figure 3.3.1 Enrollment Process..............................................................................................12
Figure 3.3.2 Authentication Process........................................................................................13
Figure 3.3.3 Method Propagation............................................................................................13
Figure 3.1.1 Android Using Fingerprint Technology..............................................................19
Figure 3.2.1.1 Choose settings menu.......................................................................................20
Figure 3.2.1.2 Choose password&fingerprint..........................................................................20
Figure 3.2.1.3 Add fingerprint.................................................................................................21
Figure 3.2.1.4 Add pattern.......................................................................................................21

iv
CHAPTER I

INTRODUCTION

I.1 Background
Identity is a must which is owned by everyone. The current verification and
identification systems are increasingly used for various applications refer to the need for
security. Nevertheless, conventional methods are still widely used. Conventional methods are
generally divided into two categories: things that are known and something possessed.
Something which is known for example pins and passwords, while something that belongs
for example keys and cards. This method has weakness example by losing or forgetting that
can occur at any time.

Security is the important things to protecting data and electronic stuff. Imagine that
people are not protecting data and electronic stuff, absolutely all the things will be lose or the
other people will take it. All the things in these worlds have been handled by technologies.
Electronic lock is the one of example of the technology security. Actually, electronic lock has
any method to protecting a room. But in this paper writers want to explain about fingerprint
on smartphone as a method that use by electronic lock.

I.2 Writing Objective

Main purpose of making this research paper is to introduce and explain to the reader
about implementation of fingerprint security system on Fingerprint Screen Lock redmin note
3, including:

1. Understand the basic theories related to implementation of fingerprint security system


on Fingerprint Screen Lock redmi note 3
2. Understand the implementation of fingerprint security sytem on Fingerprint Screen
Lock redmi note 3
3. Understand how to use Fingerprint Screen Lock on redmi note 3
4. Understand how the security of implementation fingerprint security sytem on
Fingerprint Screen Lock redmi note 3.

1
2

I.3 Problem Domain

To find out more about the implementation of fingerprint security system on


Fingerprint Screen Lock redmi note 3, there arose a problem that will be described:

What is fingerprint screen lock for android?


1. How the fingerprint security system works on redmi note 3?
2. How security systems of implementation fingerprint on Fingerprint Screen Lock
redmi note 3?
3. What advantages and disadvantages of implementation fingerprint security system on
Fingerprint Screen Lock redmi note 3?

I.4 Writing Methodology

The authors of the method used in the manufacture of these ISAS report is to
search material in the form of data from multiple sources and experiences, certain
internet sites, FAQ from the other who know Implementation of Fingerprint Security
System on Fingerprint Screen Lock Redmi Note 3, and from a variety of media to
support the author for the perfection of this paper.

I.5 Writing Framework

Chapter I Introduction
This chapter will describe about the background of the topic, the writing
objectives, problem domain, the methodology of writing, and the writing framework.

Chapter II Basic Theory

Contains definition of description about Biometrics, Fingerprint Recognition


include Fingerprint pattern and Fingerprint Minutiae.

Chapter III Problem Analysis

It provides more explanation about implementation of fingerprint security


system on Fingerprint Screen Lock Redmi Note 3, Using Fingerprint Screen Lock
Redmi Note 3, Advantages and Disadvantages of Fingerprint Screen Lock Redmi
Note 3.

Chapter IV Conclusion and Suggestion


3

Explicating the conclusion and suggestion of the topic in this papers.


CHAPTER II

BASIC THEORY

II.1 Biometric

The term biometrics refers to technologies that measure and analyse human


physiological or behavioral characteristics for authentication or identification purposes. Some
of the most widely used characteristics or biometric factors are fingerprints, irises, voice
patterns and the spatial geometry of the face.

Physical access control, say to a building, is generally based on locks and keys, on
badge readers or on few-digit pincodes which are easily lost or stolen by malicious
individuals. Because for access control based on keys or badges the authentication factor
is something you have, there is no real guarantee that the person entering your building is the
individual that was granted access in the first place. Unfortunately end users have to
remember such an amount of passwords and pincodes that they no longer apply good
password practices. End users tend to write passwords down, to keep new passwords as
simple as possible and to use always the same password.

With biometrics the access control factor is something you are, a measureable
physiological or behavioral characteristic, which is often more difficult to fake, steal or
immitate than a password or a key. Users don't have to remember it and they cannot by
accident leave it at home.

A few examples of biometric solutions which are detailled further is :

1. Fingerprint recognition
Fingerprint recognition refers to the automated method of identifying or confirming
the identity of an individual based on the comparison of two fingerprints or more.

Figure 2.1.1 Fingerprint Biometric (REF: http://www.minutehound.com)

4
5

1. Iris recognition
Iris recognition refers to the automated method of identifying or confirming the
identity of a subject by analyzing the random pattern of the iris.

Figure 2.1.2 Iris Biometric (REF: http://www.photodune.net)

2. Face recognition
Face recognition uses the spatial geometry of distinguishing features of the face It is a
form of computer vision that uses the face to identify or to authenticate a person. An
important difference with other biometric solutions is that faces can be captured from
some distance away, for example surveillance cameras.

Figure 2.1.3 Face Biometric (REF: http://www.alternet.org)

3. Voice recognition
Voice recognition or speaker recognition refers to the automated method of
identifying or confirming the identity of an individual based on his voice. Beware the
difference between speaker recognition (recognizing who is speaking) and speech
recognition (recognizing what is being said).
Figure 2.1.4 Voice Biometric (REF: http://www.zrg.com)

4. Hand geometry recognition


Hand geometry recognition is systems measure and analyze the overall structure,
shape and porportions of the hand, e.g. length, width and thickness of hand, fingers
and joints; characteristics of the skin surface such as creases and ridges. Some hand
geometry biometrics systems measure up to 90 parameters.

Figure 2.1.5 Hand Biometric (REF: http://www.autotimesystems.co.uk)

5. Retina recognition
Retina recognition of a person is done by acquiring an internal body image, the retina
of a person. Unlike other biometric technologies retinal recognition is not widely
deployed in commercial applications. The retina is a thin layer of cells at the back of
the eyeball of vertebrates. It is the part of the eye which converts light into nervous
signals, The retina consists of multiple layers of sensory tissue and millions of
photoreceptors (cells) whose function is to transform light rays into neural impulses.

Figure 2.1.6 Retina Biometric (REF: http://www.adamlevin.com)


7

II.2 History FingerPrints

Ancient artifacts including carvings similar to friction ridge skin have been
discovered in many places throughout the world. Picture writing of a hand with ridge
patterns was discovered in Nova Scotia. In ancient Babylon, fingerprints were used on clay
tablets for business transactions. fingerprints already used since ancient times as both
business or the introduction of a person, the following will explain the history of the
development of the fingerprints.

1. BC 200s – China

Chinese records from the Qin Dynasty (221-206 BC) include details about using
handprints as evidence during burglary investigations. Clay seals bearing friction ridge
impressions were used during both the Qin and Han Dynasties (221 BC - 220 AD).

Figure 2.2.1 BC 200s (REF: http: http://onin.com/fp/fphistory.html)

2. 1600-Europe
In a "Philosophical Transactions of the Royal Society of London" paper in
1684, Dr. Nehemiah Grew was the first European to publish friction ridge skin
observations. Dutch anatomist Govard Bidloo's 1685 book, "Anatomy of the Human
Body" also described friction ridge skin (papillary ridge) details.
In 1686, Marcello Malpighi, an anatomy professor at the University of Bologna, noted
fingerprint ridges, spirals and loops in his treatise. A layer of skin was named after
him; "Malpighi" layer, which is approximately 1.8 mm thick.
No mention of friction ridge skin uniqueness or permanence was made by Grew,
Bidloo or Malpighi.
8

3. Vucetich & Galton


Juan Vucetich made the first criminal fingerprint identification in 1892. He
was able to identify Francisca Rojas, a woman who murdered her two sons and cut
her own throat in an attempt to place blame on another. Her bloody print was left on
a door post, proving her identity as the murderer.

Sir Francis Galton published his book, "Fingerprints", establishing the


individuality and permanence of fingerprints. The book included the first
classification system for fingerprints. Galton's primary interest in fingerprints was as
an aid in determining heredity and racial background. Galton identified the
characteristics by which fingerprints can be identified. A few of these same
characteristics (minutia) are basically still in use today, and are sometimes referred to
as Galton Details.

4. 2016
The Unique Identification Authority of India is the world's largest fingerprint
(and largest multi-modal biometric) system, with over 820 million (82 crore)
fingerprint, face and iris biometric records. India's Unique Identification project is
also known as Aadhaar, a word meaning "the foundation" in several Indian languages.
Aadhaar is a voluntary program, with the goal of eventually providing reliable
national ID documents to most of India's 1.2 billion residents.

Figure 2.2.2 AADHAAR (REF: http: http://onin.com/fp/fphistory.html)


9

II.3 Fingerprint Recognition

Fingerprint recognition refers to the automated method of identifying or confirming


the identity of an individual based on the comparison of two fingerprints. Fingerprint
recognition is one of the most well-known biometrics, and it is by far the most used biometric
solution for authentication on computerized systems. The reasons for fingerprint recognition
being so popular are the ease of acquisition, established use and acceptance when compared
to other biometrics, and the fact that there are numerous (ten) sources of this biometric on
each individual.

II.3.1 Fingerprint Patterns

Fingerprint Patterns In general, a fingerprint can be divided into several types


according to the Henry Classification System. The three basic patterns of fingerprint ridges
are the arch, the loop, and the whorl.
1. The Arch

Arch is a pattern where the ridge enters one side of the finger, then rises in the center
forming an arch, and exits on the other side of the finger.

Figure 2.3.1.1 Arch Pattern (REF: http://www.biometric-solutions.com)

2. The Loop 

Loop is the ridge enters one side of the finger, then forms a curve, and exits on the
same side of the finger from which it entered. Loops are the most common pattern in
fingerprints.
10

Figure 2.3.1.2 Loop Pattern (REF: http://www.biometric-solutions.com)

3. The Whorl

Whorl is the pattern when ridges form circularly around a central point. Refer to the
images on the right for examples of each pattern.

Figure 2.3.1.3 Whorl Pattern (REF: http://www.biometric-solutions.com)

II.3.2 Fingerprint Readers

The uniqueness of a fingerprint is exclusively determined by the local ridge


characteristics and their relationships. The ridges and valleys in a fingerprint alternate,
flowing in a local constant direction. The two most prominent local ridge characteristics are
ridge ending and ridge bifurcation. A ridge ending is defined as the point where a ridge ends
abruptly. A ridge bifurcation is defined as the point where a ridge forks or diverges into
branch ridges. Collectively, these features are called minutiae. Detailed description of
fingerprint minutiae will be given in the next section.

The fingerprint minutiae are the points that refer to :


1. Crossover ( cross two lines )
2. Core ( rotary - reversal of a line )
3. Bifurcation ( branching a line )
4. Ending ridge ( the cessation of a line )
11

5. Island ( a very short line )


6. Delta ( the confluence of the three lines that form an angle)
7. Pore (branching a line that is immediately followed by the merging of the branches
back so as to form a small circle)

Figure 2.2.2.1 Fingerprint Minutiae Point (REF: www.accesscontrolsystem.in)

Fingerprint scanner engine will search these points and make a pattern by relating
these points. The pattern obtained from connecting points is what will be used to perform
matching when a finger is scanned. So, in fact the machine does not match the fingerprint
image, but matching the pattern obtained from the minutiae these minutiae. The points are
translated into a code number that is unique by using algorithms (mathematical process).
When reading the fingerprint is actually a unique code by comparing one with the other. If
the codes match, the print match, and the person gains access.

Figure 2.2.2.2 Fingerprint Reading (REF:https://arnoldjulians.wordpress.com)


12

Fingerprint scanner machine works by taking an image of the fingerprint and


distinguish any patterns or grooves of the fingerprint. Actually many ways you can do to take
a picture of the fingerprint, but a common method is by using three ways, namely:

1. Optical readers 

Optical readers are the most common type of fingerprint readers. The core of
the optical sensor is the CCD (Charge Couple Device), CCD is a silicon chip that is
made up of thousands and even millions of photo -sensitive diodes called photosites,
photodelements, also called pixels. Each photosite captures a single point of the
object, then assembled with other photosite catches into a single image. The type of
sensor in an optical reader is a digital camera that acquires a visual image of the
fingerprint.

Figure 2.2.2.3 CCD (REF: www.gizmag.com)

2. Capacitive readers

Capacitive readers also referred to as CMOS readers, do not read the


fingerprint using light. Instead a CMOS reader uses capacitors and thus electrical
current to form an image of the fingerprint. An important advantage of capacitive
readers over optical readers is that a capacitive reader requires a real fingerprint shape
rather than only a visual image.

Figure 2.2.2.4 CMOS (REF: www.gizmag.com)


13

3. Ultrasound readers
Ultrasound readers  are the most recent type of fingerprint readers, they use
high frequency sound waves to penetrate the epidermal (outer) layer of the skin. They
read the fingerprint on the dermal skin layer, which eliminates the need for a clean,
unscarred surface. All other types of fingerprint readers acquire an image of the outer
surface, thus requiring hands to be cleaned and free of scars before read-out.

Figure 2.2.2.5 Ultrasound Biometric Sensor (REF: http://www.sonavation.com)

II.4 Fingerprint Identification Algorithm


Introduced Fingerprint Identification System consists of two processes.
1) The enrollment process
This process consists of capturing a person’s fingerprint using a fingerprint
capturing device. During the enrollment process, the system saves the persons
fingerprint into a database.
14

Figure 2.4.1 enrollmentprocess(REF: http://www.fit.vutbr.cz)

2) The authentication process


The authentication process It is used to authenticate the claimed person. This
process consists of comparing a captured fingerprint to an enrolled fingerprint in
order to determine whether the two match. If the two fingerprints match, then the
computer will be unlocked, otherwise, an alert will be sent.

Figure 2.4.2 authenticationprocess (REF: http://www.fit.vutbr.cz)

Additionally In this Recognition Feature Segmentation results with a database in the


mix by using the method of Back propagation. Which of these processes is to find the
minimum value of the error between the data and the database will be recognized with this
Backpropagation process requires the same resolution between the data that will be
recognized by the database.
15

Figure 2.4.3 methodbackpropagation(REF: http://www.fit.vutbr.cz)


16

Figure 2.4.3 shows the process of recognition using method Back propagation. Here's a
description of the picture:
1. Data wear test fingerprint image
2. Test data taken directly from the scanner.
3. After the image was captured and converted into a binary threshold.
4. After that look for where the location of the fingerprint pattern and in –segment
characters.
5. Following that, Feature extraction using PCA.
6. Once the value of the PCA met, Enter also the value of PCA into file * .txt
desired amount of contribution. Then become a new hall mark features of the
test data.
7. If the new features of the database and data test PCA has been met then do an
introduction to the database with test data using Backpropagation method.
8. The introduction of the most sought-after value approach to be defined as the
output result of the introduction.
CHAPTER III

PROBLEM ANALYSIS

Fingerprint technology in the mobile security system is used in several purposes


related to security systems as protection for accessing the display in android in whole or few
applications only. Many applications that provide security services that use this technology,
some android has been providing feature based fingerprint technology that is ready for use,
but there are also some android that does not provide this feature, so users need to install it
first from Google Play Store or App Store. Some features that are often used in the
implementation of fingerprint security system on android are:

1. Payment system for android.


2. Fingerprint screen lock for android.
3. Fingerprint app lock for android.

III.1 Fingerprint Screen Lock for Android

Fingerprint screen lock is a type of biometric security technology that utilizes the
combination of hardware and software techniques to identify the fingerprint scans of an
individual. A fingerprint scanner typically works by first recording fingerprint scans of all
authorized individuals for a particular system or facility. These scans are saved within a
database.

Figure 3.1.1 Android Using Fingerprint Technology

17
The user requiring access puts their finger on a hardware scanner, which scans and
copies the input from the individual and looks for any similarity within the already-stored
scans. If there is a positive match, the individual is granted access. The user can lock Screen
by Screen Lock function, User’s fingerprint is the key.

III.2 Using Fingerprint Screen Lock for Redmi Note 3

Fingerprint screen lock have several options for how to perform fingerprint matching,
such as by attaching a finger on the screen that has been specified is usually like a fingerprint
image (scan) and the capturing of fingerprint through a smart phone camera.

III.2.1 Steps to use the Fingerprint scanner on Xiaomi Redmi Note 3

Fingerprint scanners can lock screen with the fingerprint. This smart phone brings on
great piece of security which lets user lock parts of user’s device rather than fully locking it
out. The following are steps fingerprint scanner application usage scan system:

1. Open settings menu/ Lock screen and password.


2. Choose password and fingerprint menu

Figure 3.2.1.1 Choose settings menu


Figure 3.2.1.2 Choose password&fingerprint
19

3. Add fingerprint and stick behind the index finger on a fingerprint sensor , tap tap
continuously multiple times until the orange color is fully charged and it says Done.
Figure 3.2.1.3 Add fingerprint

4. If you have, then will be prompted to enter additional key form of pattern pin,
password choose a pattern for locks with patterns.
20

Figure 3.2.1.4 Add Pattern

III.3 Security System of Fingerprint Screen Lock for Redmi Note 3

Fingerprints can be used as an identification system. Fingerprints have been proven to


be quite accurate, safe, easy and convenient to use as identification when compared to other
biometric system.
Properties owned by fingerprints, among others:

1. Perennial nature, that is strokes on fingerprints attached to human skin for life.
2. Immutability, that person's fingerprints never change, except getting a serious accident.
3. Individuality, fingerprint pattern is unique and different for each person.

Based on the nature of fingerprints , fingerprint used to be a protection tool that has
a good security system . Some of the smart phone security features complement the requested
pattern after running fingerprint features that will lock the screen, intended to facilitate the
use of smart phone users in case of errors in fingerprint matching pattern that has been set.
Then the user will be prompted to enter a pattern after several unsuccessful attempts to
perform fingerprint matching.
21

III.4 Advantages and Disadvantages of Fingerprint App Lock for Android

Implementation of fingerprint security system on fingerprint screen lock redmi note 3


as smart phone android has advantages and disadvantages there are:

Advantage:

1. Safety when securing user’s screen with fingerprint locks, since no two people
have the exact same fingerprint.
2. Easy to use devices, the device used for capturing fingerprint image are intuitive
and easy to use.
3. Ability to enroll multiple fingers, if there some problem with one finger, the
fingerprint technology still can be used with the other 9 fingers, sometimes using
multiple finger improve the matching function.
4. Range of deployments environments, It can be used in any place where
biometric authentication or identification are needed.

Disadvantage:

1. Inability to enroll some users. About 2 % of the population have poor quality of
fingerprint, especially the elder people and manual worker. For these cases one
need to consider other biometrics or any other solution.
2. Performance deterioration over time. Although the fingerprint is a stable
physiological characteristic, it can suffer some small changes along the time and
therefore it can affect the performance of the whole system.
3. Android smart phone determine the quality of application performance in
conducting fingerprint matching fingerprint patterns.
4. Some Application has high tendency of others (hacker) to change the data in the
fingerprint that has been set as a key to lock apps.
CHAPTER IV

CONCLUSION AND SUGGESTION

IV.1 Conclusion

Fingerprint biometric which is based on the theory allows for increased


security, comfort and akuntibilitas. Fingerprint app lock for android detect and deter
fraud, because the nature identical fingerprints of each individual and there is no
chance to duplicate fingerprints.
Fingerprint has been widely applied for the benefit of humans in everyday
situations one of them to protects the applications on android smart phones from other
people who are not responsible, it is certainly preserve user privacy.

IV.2 Suggestion

To use fingerprint technology, not all android can use this system directly, as some
kind of android need to install from Google Play Store the application to lock the app.
Fingerprint is a physiological characteristic of a stable, but the damage fingerprints
performance from time to time may experience some minor changes and therefore can affect
overall system performance.
To overcome this problem, it may be necessary to re-enroll fingerprints or use
multiple fingerprint enrollments. However, users should be wise in determining app
lock application that will be used on android because the performance of an
application that is different in some brands android.

22
BIBLIOGRAPHY

[1] Aplikasi Pemindai Sidik Jari “ScreenLocker” Gratis!! (n.d.). Retrieved November 2015,
from HpArea.com: http://hparea.com/aplikasi-pemindai-sidik-jari-screenlocker.html

[2] Biometrics. (n.d.). Retrieved Augustus 2015, from http://www.biometric-solutions.com

[3] Cara Membuat Fitur Fingerprint Menggunakan Kamera di Android. (n.d.). Retrieved
November 2015, from http://ofamni.com/cara-membuat-fitur-fingerprint-menggunakan-
kamera-di-android/

[4] CCD(Charge Couple Device). (n.d.). Retrieved 2015, from www.gizmag.com

[5] Fingerprint Attendance System. (n.d.). Retrieved september 2015, from


http://image.slidesharecdn.com/faspresentn-091114215757-phpapp02/95

[6] Fingerprint minutiae point. (n.d.). Retrieved september 2015, from


www.accesscontrolsystem.in

[7] Fingerprint Pattern. (2004). Retrieved September 2015, from


http://www.odec.ca/projects/2004/fren4j0/public_html/fingerprint_patterns.htm

[8] Fingerprint Reader. (n.d.). Retrieved september 2015, from


https://arnoldjulians.wordpress.com/2014/02/27/teknologi-biometrik-sidik-jari-cara-
kerja-dan-pemanfaatannya-dalam-kehidupan/

[9] Fingerprint Recognition. (n.d.). Retrieved Augustus 2015, from http://www.biometric-


solutions.com

[10] Griaule Biometrics. (n.d.). Retrieved November 2015, from


http://www.griaulebiometrics.com/en-us/book/understanding-biometrics/types/feature-
extraction/minutiae

[11] Technopedia TM. (n.d.). Retrieved November 2015, from Fingerprint Scanner:
https://www.techopedia.com/definition/29808/fingerprint-scanner

[12] Ultrasound Biometric Sensor. (n.d.). Retrieved September 2015, from


http://www.sonavation.com

23
24

[13] What is Biometrics? (2015). Retrieved Agustus 2015, from


http://www.bioelectronix.com/what_is_biometrics.html

You might also like