<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Pratha Maniar</title>
    <description>The latest articles on Forem by Pratha Maniar (@pratha_maniar).</description>
    <link>https://forem.com/pratha_maniar</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3609090%2Fb43eac91-794c-444c-b9eb-4d119101f925.png</url>
      <title>Forem: Pratha Maniar</title>
      <link>https://forem.com/pratha_maniar</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/pratha_maniar"/>
    <language>en</language>
    <item>
      <title>How Does a Fingerprint Turn Into a Secure Digital Identity?</title>
      <dc:creator>Pratha Maniar</dc:creator>
      <pubDate>Fri, 19 Dec 2025 06:58:47 +0000</pubDate>
      <link>https://forem.com/pratha_maniar/how-does-a-fingerprint-turn-into-a-secure-digital-identity-3p3i</link>
      <guid>https://forem.com/pratha_maniar/how-does-a-fingerprint-turn-into-a-secure-digital-identity-3p3i</guid>
      <description>&lt;h3&gt;
  
  
  Fingerprint-Based Security: From Capture to Secure Matching
&lt;/h3&gt;

&lt;p&gt;In a world where passwords are forgotten, stolen, or guessed, biometrics provides a far more reliable form of security, an identity based on who you are. Among all biometric technologies, fingerprint recognition remains the most widely deployed due to its accuracy, speed, and ease of use.&lt;/p&gt;

&lt;p&gt;But what really happens when a finger touches a sensor?&lt;br&gt;
How does a physical pattern on human skin turn into a secure digital identity?&lt;/p&gt;

&lt;p&gt;Let’s explore the complete journey, from fingerprint formation to secure matching.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. What Is a Biometric System?
&lt;/h3&gt;

&lt;p&gt;A biometric system identifies or verifies an individual using unique biological traits. Fingerprints are especially effective because they are unique, permanent, and easy to capture.&lt;/p&gt;

&lt;p&gt;Biometric systems operate in two main phases:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Enrollment&lt;/strong&gt; – registering a user’s biometric data.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authentication&lt;/strong&gt; – verifying identity using live input.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. Ridges and Valleys: The Foundation of Fingerprints
&lt;/h3&gt;

&lt;p&gt;A fingerprint is made up of alternating raised lines (ridges) and depressions (valleys) on the surface of the skin.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ridges are the elevated portions that make contact with a surface.&lt;/li&gt;
&lt;li&gt;Valleys are the spaces between ridges.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These ridge-valley patterns form unique shapes such as loops, whorls, and arches, which are determined before birth and remain stable throughout life.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. How a Fingerprint Image Is Generated
&lt;/h3&gt;

&lt;p&gt;When a finger is placed on a fingerprint sensor, ridges touch the surface while valleys remain slightly away.&lt;/p&gt;

&lt;p&gt;Depending on the sensor type:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Capacitive sensors&lt;/strong&gt; detect electrical differences between ridges and valleys.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Optical sensors&lt;/strong&gt; detect reflected light from ridge contact points.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Ultrasonic sensors&lt;/strong&gt; map depth variations using sound waves.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This interaction creates a contrast-rich image, where:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Dark areas usually represent ridges.&lt;/li&gt;
&lt;li&gt;Light areas represent valleys.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This raw image is the digital representation of the fingerprint’s physical structure.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Pre-Processing: Enhancing Ridges and Valleys
&lt;/h3&gt;

&lt;p&gt;The raw fingerprint image may contain noise due to finger pressure, moisture, or skin condition. To improve clarity, the system performs preprocessing, which includes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Contrast normalization.&lt;/li&gt;
&lt;li&gt;Noise reduction.&lt;/li&gt;
&lt;li&gt;Ridge enhancement.&lt;/li&gt;
&lt;li&gt;Binarization (ridges vs valleys).&lt;/li&gt;
&lt;li&gt;Thinning (reducing ridges to single-pixel width).
These steps sharpen the ridge-valley structure, making feature extraction more reliable.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  5. Feature Extraction: Identifying Unique Points
&lt;/h3&gt;

&lt;p&gt;Rather than storing the entire fingerprint image, the system extracts distinct features, mainly minutiae points.&lt;/p&gt;

&lt;p&gt;Minutiae occur where:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A ridge ends.&lt;/li&gt;
&lt;li&gt;A ridge split into two (bifurcation).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each minutia is defined by:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Its location.&lt;/li&gt;
&lt;li&gt;Its orientation.&lt;/li&gt;
&lt;li&gt;Its type.
A fingerprint typically contains dozens of usable minutiae, which together form a unique digital signature.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  6. Enrollment: Creating a Secure Fingerprint Template
&lt;/h3&gt;

&lt;p&gt;During enrollment:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Minutiae are extracted from each scan.&lt;/li&gt;
&lt;li&gt;A stable reference template is generated.&lt;/li&gt;
&lt;li&gt;The template is encrypted and stored securely.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  7. Secure Storage: Protecting Biometric Identity
&lt;/h3&gt;

&lt;p&gt;Because biometric data cannot be changed like a password, security is critical. Modern systems use:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Encrypted template storage.&lt;/li&gt;
&lt;li&gt;Secure elements or trusted execution environments.&lt;/li&gt;
&lt;li&gt;Hardware-based cryptographic protection.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This ensures fingerprints cannot be reconstructed even if storage is compromised.&lt;/p&gt;

&lt;h3&gt;
  
  
  8. Authentication: Matching Ridges and Patterns
&lt;/h3&gt;

&lt;p&gt;During authentication:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A live fingerprint is captured.&lt;/li&gt;
&lt;li&gt;Its features are extracted.&lt;/li&gt;
&lt;li&gt;The live template is compared with the stored template.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Matching algorithms align ridge patterns, compare minutiae relationships, and compute a similarity score. Access is granted only if the score crosses a secure threshold.&lt;/p&gt;

&lt;h3&gt;
  
  
  9. Accuracy and Anti-Spoofing Measures
&lt;/h3&gt;

&lt;p&gt;To prevent fake fingerprints, systems use liveness detection, checking factors like skin conductivity, ridge deformation, and depth/texture variations to ensure the fingerprint comes from a real, live finger.&lt;/p&gt;

&lt;h3&gt;
  
  
  Conclusion
&lt;/h3&gt;

&lt;p&gt;Fingerprint biometrics use unique ridge and valley patterns to create a secure digital identity. From image capture to minutiae extraction and encrypted matching, every step ensures accuracy, privacy, and security.&lt;/p&gt;

&lt;p&gt;What seems like a simple touch is actually a powerful combination of biology, signal processing, cryptography, and embedded engineering, making fingerprints one of the most trusted security mechanisms in modern systems.&lt;/p&gt;

</description>
      <category>security</category>
      <category>biometric</category>
      <category>dataprocessing</category>
      <category>fingerprint</category>
    </item>
    <item>
      <title>A Deep Dive Into ESP-CSI: Channel State Information on ESP32 Chips</title>
      <dc:creator>Pratha Maniar</dc:creator>
      <pubDate>Wed, 19 Nov 2025 12:21:23 +0000</pubDate>
      <link>https://forem.com/pratha_maniar/a-deep-dive-into-esp-csi-channel-state-information-on-esp32-chips-5el1</link>
      <guid>https://forem.com/pratha_maniar/a-deep-dive-into-esp-csi-channel-state-information-on-esp32-chips-5el1</guid>
      <description>&lt;p&gt;Most people know Wi-Fi only as a way to connect phones, laptops, and IoT devices to the internet. But Wi-Fi can do much more.&lt;/p&gt;

&lt;p&gt;Espressif’s ESP-CSI (Channel State Information) technology allows ESP32-series chips to “sense” what is happening in the environment using only Wi-Fi signals-no cameras, no radar, no extra sensors.&lt;/p&gt;

&lt;p&gt;Every Wi-Fi signal changes as it passes through a room.&lt;br&gt;
People, walls, furniture, movement-everything affects the signal slightly.&lt;br&gt;
ESP-CSI captures these tiny changes in the Wi-Fi channel and turns them into meaningful data.&lt;/p&gt;

&lt;p&gt;This makes it possible to detect:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Human presence&lt;/li&gt;
&lt;li&gt;Motion&lt;/li&gt;
&lt;li&gt;Gestures&lt;/li&gt;
&lt;li&gt;Indoor positioning&lt;/li&gt;
&lt;li&gt;Environmental changes&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And all of this works using only an ESP chip and Wi-Fi.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why Is ESP-CSI Better Than RSSI?
&lt;/h3&gt;

&lt;p&gt;Normally, Wi-Fi devices only report RSSI (Received Signal Strength Indicator), which is a single number representing signal strength.&lt;br&gt;
However, CSI provides much more detailed information, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;How each frequency of the Wi-Fi signal was changed.&lt;/li&gt;
&lt;li&gt;How much it was absorbed or reflected.&lt;/li&gt;
&lt;li&gt;How much noise is in the environment.&lt;/li&gt;
&lt;li&gt;How the signal phase rotated.&lt;/li&gt;
&lt;li&gt;How the signal was delayed.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;strong&gt;Aspect&lt;/strong&gt;&lt;/th&gt;
&lt;th&gt;&lt;strong&gt;RSSI&lt;/strong&gt;&lt;/th&gt;
&lt;th&gt;&lt;strong&gt;CSI&lt;/strong&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;What it shows&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Overall signal strength (one value)&lt;/td&gt;
&lt;td&gt;Detailed channel info (amplitude + phase per subcarrier)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Detail Level&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Low&lt;/td&gt;
&lt;td&gt;Very high&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Sensitivity&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Detects big changes only&lt;/td&gt;
&lt;td&gt;Detects tiny movements (even breathing)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Use Cases&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Basic connection quality, coarse location&lt;/td&gt;
&lt;td&gt;Motion sensing, presence, gesture, indoor positioning&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Interference&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Easily affected&lt;/td&gt;
&lt;td&gt;More stable if environment doesn’t change&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Accuracy&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Low&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h3&gt;
  
  
  How Does ESP-CSI Work?
&lt;/h3&gt;

&lt;p&gt;Wi-Fi uses OFDM, which splits one Wi-Fi channel into many smaller frequencies called subcarriers. Each Wi-Fi packet carries amplitude and phase information for every subcarrier.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;When these subcarriers travel through the environment, they get affected by:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;People absorbing energy.&lt;/li&gt;
&lt;li&gt;Moving objects shifting the wave pattern.&lt;/li&gt;
&lt;li&gt;Walls reflecting the signal.&lt;/li&gt;
&lt;li&gt;Furniture and air slightly bending the waves.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;The ESP chip measures two things for each subcarrier:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amplitude-how strong the signal became.&lt;/li&gt;
&lt;li&gt;Phase-how much the wave rotated or was delayed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Together, this forms the CSI (Channel State Information) array.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;When someone moves:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Amplitude values fluctuate.&lt;/li&gt;
&lt;li&gt;Phase values shift in characteristic patterns.&lt;/li&gt;
&lt;li&gt;Even small movements cause detectable changes.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These tiny variations act as “clues” about what happened in the environment. The ESP device captures this at the PHY layer, then exposes it to the user through CSI callback events in Espressif’s API.&lt;/p&gt;

&lt;h3&gt;
  
  
  Features of ESP-CSI
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;1. Detailed Channel Insights&lt;/strong&gt;&lt;br&gt;
CSI provides amplitude and phase information for every Wi-Fi subcarrier, giving much more detail than a single RSSI value. This allows precise sensing of environmental changes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. No Extra Hardware Required&lt;/strong&gt;&lt;br&gt;
Works on standard ESP32-series chips (ESP32, S2, C3, C6, etc.) using built-in Wi-Fi no special sensors or NICs needed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. High Sensitivity&lt;/strong&gt;&lt;br&gt;
Can detect both large movements and very small changes, such as breathing or slight object shifts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Real-Time Processing&lt;/strong&gt;&lt;br&gt;
ESP chips can analyze CSI data locally and instantly, enabling fast responses without needing external servers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Flexible Operating Modes&lt;/strong&gt;&lt;br&gt;
Supports multiple ways to collect CSI, including sniffer mode, router-based CSI, and device-to-device communication for advanced setups.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6. Stable and Robust&lt;/strong&gt;&lt;br&gt;
CSI amplitude data stays reliable even with typical indoor interference like chargers or other electronic devices.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;7. Easy Software Integration&lt;/strong&gt;&lt;br&gt;
Fully supported in ESP-IDF and compatible with Espressif cloud tools, with open-source utilities to process and analyze CSI data.&lt;/p&gt;

&lt;h3&gt;
  
  
  Where Is ESP-CSI Used?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Human activity detection:&lt;/strong&gt; Detect presence, movement, gestures, or even subtle actions like breathing-useful for security, elder care, and smart homes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Indoor positioning:&lt;/strong&gt; Provide accurate indoor location tracking for people or devices in buildings like malls, airports, and hospitals.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Environmental monitoring:&lt;/strong&gt; Sense small changes in the environment through Wi-Fi signal variations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Intrusion detection:&lt;/strong&gt; Act as a motion sensor to detect unauthorized movement without cameras.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Asset tracking:&lt;/strong&gt; Track the real-time location of important items in places like warehouses or hospitals.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Smart home automation:&lt;/strong&gt; Enable location-based actions, such as auto-adjusting lights, AC, or appliances.&lt;/p&gt;

&lt;h3&gt;
  
  
  Chip Performance Ranking
&lt;/h3&gt;

&lt;p&gt;Espressif categorizes the CSI capability of its chips approximately in the following order.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;ESP32-C5 ＞ ESP32-C6 ＞ ESP32-C3 ≈ ESP32-S3 ＞ ESP32.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  Meaning:
&lt;/h4&gt;

&lt;p&gt;Newer chips, like C5 &amp;amp; C6, → better CSI quality.&lt;br&gt;
C3 &amp;amp; S3 → good general performance.&lt;br&gt;
Original ESP32 → lowest but still works.&lt;/p&gt;

&lt;h3&gt;
  
  
  How Can ESP-CSI Be Implemented?
&lt;/h3&gt;

&lt;p&gt;Espressif provides three ways to obtain CSI data.&lt;/p&gt;

&lt;h4&gt;
  
  
  Method 1: Getting CSI from a Router (get_router_csi)
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Setup:&lt;/strong&gt; One ESP device + a router.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Process:&lt;/strong&gt;
ESP sends ping packets to the router.
The router replies with packets containing CSI information.
ESP receives those packets and extracts CSI (amplitude, phase, etc.).
This is the simplest method-ideal for beginners.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Method 2: Exchanging CSI Between Two ESP Devices (get_device_csi)
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Setup:&lt;/strong&gt; Two ESP chips + router acting as a relay.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Process:&lt;/strong&gt;
Both ESP devices send ping packets to the router.
The router forwards packets to the correct device.
When Device B receives a ping from Device A, it replies with CSI.
Device A then extracts CSI information.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Method 3: Getting CSI Using a Dedicated Packet Sender (get_broadcast_csi)
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Setup:&lt;/strong&gt; A device that sends broadcast packets + multiple ESP receivers.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Process:&lt;/strong&gt;
The transmitter sends broadcast packets on different Wi-Fi channels.
All ESP devices (in monitor mode) receive these packets.
Each ESP extracts CSI data independently.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Want to dive deeper?&lt;/strong&gt; &lt;br&gt;
Check out Espressif’s official CSI documentation here:&lt;br&gt;
&lt;a href="https://docs.espressif.com/projects/esp-techpedia/en/latest/esp-friends/solution-introduction/esp-csi/esp-csi-solution.html" rel="noopener noreferrer"&gt;https://docs.espressif.com/projects/esp-techpedia/en/latest/esp-friends/solution-introduction/esp-csi/esp-csi-solution.html&lt;/a&gt;&lt;/p&gt;

</description>
      <category>esp32</category>
      <category>beginners</category>
      <category>wifisensing</category>
      <category>iot</category>
    </item>
  </channel>
</rss>
