PRESENTATIONProject Title: “FINGERPRINT RECOGNITION FOR . SECURITY”By BISANGABAGABO AlphonseRegistration Number: GS20100516Supervisor: Dr. NGARAMBE Donart.
ABSTRACTFingerprint recognition refers to the automatedmethod of verifying match between two humanfingerprints. This project will study on the useof “Fingerprints” to improve the way student’sidentification for security is done within KIST.The algorithm used is based on FingerprintScanning, Fingerprint Matching, Identificationimage. The Project implementation will use Cprogramming language as a programming tool.
INTRODUCTION Nowadays, authentication is among the mostchallenging issues in different sectors of life.The use of ID cards, PINs, Passwords can beforgotten or guessed, cards and badges can getlost, stolen or lent to a friend for the illegal use.The same case can happen in any institution.This project is planned with objective offinding accurate solution to that issuespecifically in KIST, where anybody has toidentify him/her self to a security guard usingcard.
Introduction Cont’d The use of Biometrics technology is the solution. A fingerprint was found to have specific characteristics (Minutiae) that are unique to anybody. The advantage of using Fingerprint recognition applications can be summarized into three classes Easy mode life Prevent fraud Control
INTRODUCTION Cont’d The Oldest form of Biometrics Highly Reliable Uses distinctive features of fingers No thief can steal it. Never forgotten at home.
GENERAL OBJECTIVES To replace token based authentication by biometric recognition methods. To build automatic and rapid system in order to optimize the authentication check.
SPECIFIC OBJECTIVES To apply new technology in everyday life in the vision of avoiding fraud and security risk of being confused. To remove students stress in case cards are forgotten or lost. To reduce task of security guards and let the decision be automatic.
EXISTING SYSTEM In KIST Fingerprint system already exists. It simply monitors the employee’s arrival and/or leave time. For student identification, cards are presented to a security guard on entrance gates. The existing system is limited in functionalities, new features need to be added.
PROPOSED SYSTEM Fingerprint image Fingerprint image aquisition aquisition image Processing Compare Stored in database Image to Processing Database Authorized Refused
PROBLEM STATEMENT Some outside people enter the KIST gates using stolen or borrowed students cards. Some times, students miss classes when cards forgotten, lost or stolen.
PROCESS This project will proceed successive stages following the modified waterfall model. Each step starts when the previous is finished It is possible to review a finished stage and make some modification whenever needed.
SOFTWARE PLATFORM Operating system (OS) Name: Microsoft Windows xp Professional OS version : 5.1.2600 Service Pack 2 Build 2600 OS Configuration : Standalone Workstation Microsoft visual c++ Sql server 2005
HARDWARE System manufacturer : Dell Computer Corporation Model : Latitude D400 System type : X86-based PC Processor: : x86 family 6 Model 13 stepping 6 Genuine Intel 1594 MHz BIOS version: DELL – 27d40903 Physical memory: 510 MB Virtual Memory: 2048 Storage: 60 GB
SCOPE OF PROJECT This project “Fingerprint recognition for Security” will use a sample of hundred (100) fingerprints because of the time and resource limitation. The system we will develop will be tested on a single computer. All the activities and researches of this project will take place inside KIST using available and accessible resources.
FINGERPRINT impression of the friction ridges of all or any part of the finger. Oldest form of Biometrics Highly Reliable Uses distinctive features of fingers
FINGERPRINT SCANNER/SENSOR A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern.
FINGERPRINT impression of the friction ridges of all or any part of the finger. Oldest form of Biometrics Highly Reliable
APPLICATIONS Personal computer / workstation security. Network / enterprise security. e-commerce / e-business. Electronic transactions. Physical Access Control (e.g. Airport) Information System Security National ID Systems Identification of Criminals