Professional Documents
Culture Documents
CHAPTER ONE
1.1
Introduction
1.1
Background of Study
The human body has the privilege of having features that are unique and
exclusive to each individual. This exclusivity and unique characteristic has
led to the field of biometrics and its application in ensuring security in
various fields. Biometrics has gained popularity and has proved itself to be a
reliable mode of ensuring privacy, maintaining security and identifying
individuals. It has wide acceptance throughout the globe and now is being
used at places like airports, hospitals, schools, corporate offices etc.
Biometrics is the very study of identifying a person by his/her physical traits
that are inherent and unique to only the person concerned. Biometric
measurement
and
assessment
include
fingerprint
verification,
iris
1.2
Its a well known fact that every human being is born with a different pattern
on the fingers and this feature is exploited to identify and differentiate
between two different persons. The main objective this work is to build a
biometric exam registration and verification system based on the finger print
technology. The system will be capable of taking samples of the fingerprint of
students a process called scanning; it will also process and store it in the
database alongside with the students passport photograph. During
examination every student is required to verify his/her identity before
granted access to the exam hall.
1.3
CHAPTER TWO
2.0
History of Fingerprinting
There are records of fingerprints being taken many centuries ago, although
they weren't nearly as sophisticated as they are today. The ancient
Babylonians pressed the tips of their fingertips into clay to record business
transactions. The Chinese used ink-on-paper finger impressions for business
and to help identify their children.
Fig 2.0:
wrote to his cousin, the famed naturalist Charles Darwin, and asked for help
with developing a fingerprint classification system. Darwin declined, but
forwarded the letter to his cousin, Sir Francis Galton.
Galton was a eugenicist who collected measurements on people around the
world to determine how traits were inherited from one generation to the
next. He began collecting fingerprints and eventually gathered some 8,000
different samples to analyze. In 1892, he published a book called
"Fingerprints," in which he outlined a fingerprint classification system -- the
first in existence. The system was based on patterns of arches, loops and
whorls.
1892, Vucetich was called in to assist with the investigation of two boys
murdered in Necochea, a village near Buenos Aires. Suspicion had fallen
initially on a man named Velasquez, a love interest of the boys' mother,
Francisca Rojas. But when Vucetich compared fingerprints found at the
murder scene to those of both Velasquez and Rojas, they matched Rojas'
exactly. She confessed to the crime. This was the first time fingerprints had
been used in a criminal investigation. Vucetich called his system comparative
dactyloscopy. It's still used in many Spanish-speaking countries.
courts. In 1903, the New York state prisons adopted the use of fingerprints,
followed later by the FBI.
2.1
The Henry system finally enabled law enforcement officials to classify and
identify individual fingerprints. Unfortunately, the system was very
cumbersome. When fingerprints came in, detectives would have to compare
them manually with the fingerprints on file for a specific criminal (that's if
the person even had a record). The process would take hours or even days
and didn't always produce a match. By the 1970s, computers were in
existence, and the FBI knew it had to automate the process of classifying,
searching for and matching fingerprints. The Japanese National Police Agency
paved the way for this automation, establishing the first electronic
fingerprint matching system in the 1980s. Their Automated Fingerprint
Identification Systems (AFIS), eventually enabled law enforcement officials
around the world to cross-check a print with millions of fingerprint records
almost instantaneously.
11
CHAPTER THREE
3.0
RESEARCH METHODOLOGY
Basically, the research on this work was done both on the internet and on
various computer and electrical/electronic textbooks including also some
other electronic circuit designing book. The fingerprint module was sourced
from online market, and after its arrival, the programing commenced. A
computer system was assembled to use in storing the database. More detail
of the work, its principle of operation and implementation are described
below.
3.1
Fingerprint Recognition
Once the fingerprint is captured, the next step is the recognition procedure.
The recognition procedure can be broadly sub grouped into
Fingerprint Identification and
Fingerprint Verification
12
14
3.2
Image Enhancement
the
Enhanced Image
v=0,1,2, .,31
(3)
Figure 3.4 FFT enhanced fingerprint image (Source: Davide Maltoni, Dario
Maio, Anil K. Jain, Salil Prabhakar, Handbook of Fingerprint recognition)
Before Enhancement
After Enhancement
The image after enhancement connects falsely broken points on the ridges
Binarized Image
Gray image
3.5
Image segmentation
(px)
and
y-
direction (py) for each pixel of the block using two Sober
filters.
ii.
2
tp2 = 2sincos /(cos2 -sin )
CHAPTER FOUR
4. SYSTEM DESIGN
The design of fingerprint based biometrics for
verification system can be divided into the three different modules. They
areProcessor Module
Fingerprint Capture
PC based Server-Client Software Management Module
The module-wise approach to the design of the system helps in better
understanding of the individual function levels. Also, a parallel
approach to the system helps in distributing the effort on a multi-level
range and helps in identifying the best features and available products in
the market that suit the design requirements.
Power up and initialize itself and dependent modules. Check for interrupts,
faults while the modules get initialised. Command the fingerprint module to
function as requested by the software interface. Enable data transfer
through the wireless module.
DATA TRANSFER
After the fingerprint image has been processed, the data is to be transferred
to the central server through a channel. The data packet is to be coded into
an encrypted form due to the sensitive nature of the information it carries.
The data communicated to the server is broadly classified into two types:
Enrol Data
Daily Attendance Data
Enrol Data
This data is initially obtained when adding the new students to the
institute database. Along with Personal Identification Numbers (PIN),
student-specific data such as degree program, date of birth (DOB),
Once all the students are enrolled into the institutes Student database
System, the semester work of each examiner is to verify the authenticity of
the candidates identity before allowed into the exam hall.
RESULT
Initial progress is mentioned below:
i.
AFS8500/8600 were tested for proper functioning. The two were found
to work properly.
ii.
operation was analyzed. It was observed to be an Enroll-Once-VerifyOnce software. The threshold for content matching was very low and
flexibility for different orientations of the finger was not present.
iii.
DWA-510.
The main objective of the project then was to enroll fingerprints of different
students and add them to the database which would be referred at the time
of verification. For this purpose, Fingerprint Recognition Toolbox provided
for use in MATLAB was used. For a particular trial run of the system,
fingerprints of eight students were captured using the hardware kit in
the lab and fingerprint image of seven were added to the database. The
templates stored were named from s1 to s7. To show the successful
functioning of the system three sample outputs are provided that show
i.
ii.
iii.
Image enhancement
Inorder
to
ensure
of an
CHAPTER FIVE
CONCLUSION
A large number of applications are demanding effective and reliable
biometric solutions. Fingerprints proved to be one of the best biometric
modalities thanks to their distinctiveness, stability and accessibility (low
cost of acquisition devices). Although the first algorithms were developed
more than 50 years ago, sensing, feature extraction and matching
techniques are being continuously improved, making it possible nowadays
to automatically process also low quality impressions in a very short time.
In this work, the fingerprints of different students were successfully
enrolled and added to the database. The fingerprints were further verified
and several dry runs were made that confirmed matches and mismatches
for different samples. Apart from that, visual basic was used to
demonstrate the various functions and processing methods used in
image processing of the fingerprint. The outputs for all the trial runs and
process demonstration were recorded. The data transfer was made across
a channel in the lab connecting two terminals. This communication meant
that the range was limited to a short span but the data transfer process was
efficient enough for the successful functioning of the system.
RECOMMENDATION
There is a lot of scope in the field of biometrics application at the work
place. The exam registration/verification system using fingerprint
recognition can be of immense important if certain nuances are taken into
consideration. Wireless channel should be used, but should not be limited
to a short range and hence the system could only be tested in the lab. For a
greater range and more versatile application, a different channel could be
considered which would ensure faster data transfer and provide better
flexibility. The security aspect of transmission can be worked upon since
data security in case of sensitive data transfer is highly essential.
Finally, the proposed model for each PC server client software
management system can be materialized using cost effective products
offered in the market.
REFERENCES
Performance Evaluation", IEEE Transactions on PAMI ,Vol. 20, No. 8, pp.777789, August 1998.
[7] SPRA894A, Texas Instruments, DSP for Smart Biometric Solutions
[8] User Manual, DWA-510
[9] SPRAA23, Texas Instruments, FADT2 Quick Start Guide
[10] TMS320C6713 DSK Technical Reference, (5067350001 Rev. B) [11] FVC2002.
http://bias.csr.unibo.it/fvc2002/
[12] Fingerprint Recognition System by Luigi
Rosa,
(http://www.mathworks.it/matlabcentral/fileexc
hange/4239)
[13] Shlomo Greenberg, Mayer Aladjem, Daniel Kogan and Itshak Dimitrov,
Fingerprint Image Enhancement using Filtering Techniques