Fingerprint An Then Ti Cation

download Fingerprint An Then Ti Cation

of 27

Transcript of Fingerprint An Then Ti Cation

  • 8/8/2019 Fingerprint An Then Ti Cation

    1/27

  • 8/8/2019 Fingerprint An Then Ti Cation

    2/27

    Abstract

    Authentication is the act of establishing orconfirming something (or someone) as authentic,that is, that claims made by or about the subject

    are true.

    Biometrics comprises methods for uniquelyrecognizing humans based upon one or

    more intrinsic physical or behavioral traits.

    In computer science, in particular, biometrics isused as a form of identity access

    management and access control.

  • 8/8/2019 Fingerprint An Then Ti Cation

    3/27

    We are creating the user interface andenrolling the user into the system.

    During enrollment we are interacting withthe scanner to generate template.

    In enrolling we are storing the generatedtemplate along with the user details into thedatabase

  • 8/8/2019 Fingerprint An Then Ti Cation

    4/27

    Fingerprint Authentication

    Fingerprint is one of the most widely usedbiometric techniques in the world today. It israpidly evolving technology that has been widelyused in forensics such as prison security, criminalIdentifications.

    Using fingerprint to make a personalidentification has the following characteristics

    * Universality* Uniqueness* Permanence* Collectability

  • 8/8/2019 Fingerprint An Then Ti Cation

    5/27

    Fingerprint Properties

  • 8/8/2019 Fingerprint An Then Ti Cation

    6/27

    Fingerprint Types

  • 8/8/2019 Fingerprint An Then Ti Cation

    7/27

    Existing System

    In our college existing student/facultyattendance system is not fully

    computerized. Attendance is taken manually and storedmanually in the database.

    Identification is also manual by checkingtheir ID cards.

    If we continue with this system leads tosecurity threats

  • 8/8/2019 Fingerprint An Then Ti Cation

    8/27

    Disadvantages

    It is purely time consuming.

    Chances of human errors.

    Not secured. Most embarrassing process.

    Workload for faculty.

    Not so much reliable.

  • 8/8/2019 Fingerprint An Then Ti Cation

    9/27

    Proposed System

    Completely computerizing the existingsystem.

    Implementing authentication systembased on the fingerprint which is mostsecured and reliable.

  • 8/8/2019 Fingerprint An Then Ti Cation

    10/27

    Advantages

    Most Secured and reliable.

    Easier System Implementation.

    Accurate. Cost Effective.

    Effective GUI for end user

    interoperability. Possibility of user updation/deletion.

  • 8/8/2019 Fingerprint An Then Ti Cation

    11/27

    Further Enhancements

    It may extended to client/serverenvironment.

    It is compatible to extend itsproperties access to entire collegesystem i.e. library, internet labs etc..,

  • 8/8/2019 Fingerprint An Then Ti Cation

    12/27

    Project Sketch

    GUIGUI

    Fingerprint

    Verification

    Fingerprint

    Verification

    DatabaseDatabase

    Fingerprint

    Enrollment

    Fingerprint

    Enrollment

  • 8/8/2019 Fingerprint An Then Ti Cation

    13/27

    Modules

    GUI Creation

    Fingerprint Enrollment

    Fingerprint Verification

    Database Maintenance

    Device Interaction

  • 8/8/2019 Fingerprint An Then Ti Cation

    14/27

    Requirements

    Software Requirements

    Front End: NetBeans IDE6.8, jdk 1.6 with

    jre6, Visual Basic 6.0

    Back End: Oracle 10g

    Platform: Windows XP/vista/07, Ubuntu

    Hardware Requirements

    Scanner: Nitgen Fingkey Hamster 1RAM: 1GB

    Processor: Pentium/AMD 32-bit

  • 8/8/2019 Fingerprint An Then Ti Cation

    15/27

    Modules we are doing

    GUI Creation

    Fingerprint Enrollment

    Device Interaction DuringEnrollment

  • 8/8/2019 Fingerprint An Then Ti Cation

    16/27

    User EnrollmentAlgorithm:

    1. Start2. Fill the register form and make a snapshot of the person

    3. Put the right thumb on the Scanner.

    4. Check whether the thumb is present on the scanner or not.

    5. If (present) then

    6. goto step 97. else

    8. goto step 2

    9. endif

    10. Extract the Fingerprint template from the Thumb reader andstore that template in a variable called template.

    11. Store user details and that template in the database bykeeping template as primary key.

    12. Stop

  • 8/8/2019 Fingerprint An Then Ti Cation

    17/27

    FingerprintEnrollment

    User scannerFeature

    Extraction Template

    Database

  • 8/8/2019 Fingerprint An Then Ti Cation

    18/27

    For Enrollment

  • 8/8/2019 Fingerprint An Then Ti Cation

    19/27

    GUI Creation

    GUI

    Friendly

    Interface

    Friendly

    Interface

    Look & FeelLook & Feel EffectiveEffective

  • 8/8/2019 Fingerprint An Then Ti Cation

    20/27

    These graphical icons effectively

    represents the complete features ofthe project.

    Effective GUI for end userinteroperability.

    Look and feel of GUI may change as peruser interest.

    Updations and deletions are performedon the enrolled user.

  • 8/8/2019 Fingerprint An Then Ti Cation

    21/27

    Look & Feel

  • 8/8/2019 Fingerprint An Then Ti Cation

    22/27

    ImageRetrievalAlgorithm:

    1. Start

    2. Put the right thumb on the Scanner.

    3. Check whether the thumb is present on the scanner or not.

    4. If (present) then

    5. goto step 9

    6. else

    7. goto step 2

    8. endif

    9. Extract the Fingerprint template from the Thumb reader and storethat template in a variable called template.

    10. If(template matches in database) then11. goto step 14

    12. Else

    13. exit

    14. Display image along with his details

    15. Stop

  • 8/8/2019 Fingerprint An Then Ti Cation

    23/27

    For Valid User

  • 8/8/2019 Fingerprint An Then Ti Cation

    24/27

    For Invalid User

  • 8/8/2019 Fingerprint An Then Ti Cation

    25/27

    DeviceInteractionDuring

    Enrollment Interaction is nothing but

  • 8/8/2019 Fingerprint An Then Ti Cation

    26/27

    Conclusion

    To implement fingerprint basedcomplete computerized authenticationsystem in the college.

    Increases the security levels

    Decrease malpractices and

    Decreases the existing manual work.

  • 8/8/2019 Fingerprint An Then Ti Cation

    27/27

    Arabic

    Simplified Chinese

    Traditional Chinese

    ObrigadoBrazilian Portuguese

    Japanese

    MerciFrench

    GrazieItalian

    Russian

    Thai

    DankeGerman

    Thank you

    GraciasSpanish