SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 9, No. 4, August 2019, pp. 2346~2353
ISSN: 2088-8708, DOI: 10.11591/ijece.v9i4.pp2346-2353  2346
Journal homepage: http://iaescore.com/journals/index.php/IJECE
Portable and efficient fingerprint authentication system based
on a microcontroller
Mauricio García Vargas1
, Fredy E. Hoyos2
, John E. Candelo3
1,2
Escuela de Física, Facultad de Ciencias, Sede Medellín, Universidad Nacional de Colombia, Colombia
3
Departmento de Energía Eléctrica y Automática, Facultad de Minas, Sede Medellín,
Universidad Nacional de Colombia, Colombia
Article Info ABSTRACT
Article history:
Received Apr 12, 2018
Revised Mar 5, 2019
Accepted Mar 11, 2019
This paper presents the design of a fingerprint authentication system
based on a simple microcontroller and the fingerprint sensor.
The circuit diagram and details regarding the procedure are included.
The system was programed in MPLAB and then embedded into the
microcontroller. Communication between the PIC and sensor is by
RS232 protocol. The results show that the system recognizes the
fingerprint in less than 1 second. It is portable and there is no need
for image processing. Furthermore, the system shows a high
effectiveness when storing and verifying fingerprints.
Keywords:
Authentication
Fingerprint sensor
Microcontroller
Copyright © 2019 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Fredy Edimer Hoyos
Universidad Nacional de Colombia, Sede Medellín
Calle 59A No. 63-20, Medellín, Colombia.
Telephone: (574) 4309327
Email: fehoyosve@unal.edu.co
1. INTRODUCTION
Nowadays, security is one of the most significant necessities in society and the demand for highly
secure authentication systems is increasing all over the world. In this context, biometrics plays an important
role. Biometrics refers to the use of distinctive anatomical and behavioral characteristics for automatically
recognizing individuals [1]. The importance of biometrics is in the fact that the anatomical and behavioral
characteristics of an individual cannot be misplaced, shared, or copied. Among all biometric technologies,
fingerprint analysis is universally used due to its easy acquisition, high distinctiveness, persistence, and
acceptance by the public [2, 3]; however, other technologies, such as ECG waveform features, are also found
in the literature [4]. Fingerprint recognition has been used in home safety, forensic applications, smartphones,
security boxes, smart homes, and even as a work or classroom attendance system [5-9]. Any fingerprint
recognition system includes four phases: acquisition, representation (template), feature extraction,
and matching [10]. Because the sensor used in this paper carries out the pre- and post-processing of
the digital image independently, we can talk about two phases: the enrollment and the matching phase.
During the enrollment process, the fingerprint is captured and stored in a database and during the recognition
process the fingerprint is captured and compared with all the fingerprints that are stored in that database.
This is known as (1:N) matching and helps identify a particular person’s fingerprint (1:1). Matching refers to
comparing the captured fingerprint with another fingerprint previously enrolled in the database [11] and is
commonly used for authentication.
There are several publications about fingerprint recognition. In [12], a fingerprint authentication
system is implemented and applied in distance education where courses are developed in learning
Int J Elec & Comp Eng ISSN: 2088-8708 
Portable and efficient fingerprint authentication system based on a … (Mauricio García Vargas)
2347
management systems. A pre-processing of the image was carried out to remove noise and apply a filter to the
pattern. In [13], a feature extraction method using minutiae points is proposed. Minutiae points are also used
in this paper for fingerprint authentication. In [14], a biometric fingerprint system is designed using Arduino
and a fingerprint sensor R305. In [15], a fingerprint system is proposed and tested using an image filtering
technique that improves the speed of the system. For real-time implementation, the system is tested using an
FPGA (Field Programmable Gate Array). In [16], authors present a fingerprint verification system using a
sweep, tactile fingerprint sensor, and an FPGA. The functioning of the system is explained in detail. In [17],
an authentication system is implemented using a capacitive fingerprint sensor that embeds a 32-bit
microcontroller. In [7], the authors demonstrate the performance of a fingerprint recognition system
implemented with an ARM Cortex-M3 microcontroller and an FPC1011F3 capacitive sensor; the final
algorithm was also tried in a Raspberry Pi 2 to display the matching results in a Graphical User Interface
(GUI). In [18], a fingerprint authentication system is implemented using an FPGA and the processing of the
image is carried out. The authors suggest the low cost of the system is due to using the FPGA. Finally,
in [19], a fingerprint-based user authentication system is implemented using a T1050.3 Xtensa processor and
an AES3400 fingerprint sensor. The sensor is connected to the processor, where the processing of the image
is carried out using specific software. Matching results are shown in the processor; however, none of these
publications show the schematic of the corresponding circuits and details of the procedure to carry out the
hardware implementation. Additionally, [12, 13, 15, 18, 19, 20] carry out an image processing phase that
makes the system complex and reduces its portability. This image processing phase is internally carried out
by the fingerprint sensor FZ1036G used for this paper. This is possible due to an embedded microcontroller.
In [14, 17], the authors also use a fingerprint sensor with an embedded microcontroller to perform
image processing.
In this paper, we present the design of a fingerprint authentication system using the microcontroller
PIC18f252 and the fingerprint sensor FZ1036G, and implement (1:1) matching. The program is made in
MPLAB X IDE v3.65 and then burned into the microcontroller. Once the microcontroller is programmed,
the system consists only of the microcontroller and the fingerprint sensor, thus making it portable and
efficient. Communication between the PIC and the sensor is by RS232 protocol. The main contribution of
this paper is that due to the sensor capacity, the proposed system is able to acquire or match a fingerprint
image in less than 1 s. In addition, because the fingerprint sensor has an embedded microcontroller that is in
charge of the image processing, there is no need to implement an image processing phase. Moreover, the
circuit diagram and details regarding the procedure are shown. The rest of the paper is divided into four
sections. Section 2 presents the model used in fingerprint recognition. Section 3 describes the materials,
methods used to build the fingerprint recognition system, and the procedures. Section 4 presents the tests, the
results, the analysis, and discussion. Finally, Section 5 concludes.
2. MODELING OF FINGERPRINT RECOGNITION SYSTEM
Fingerprints are graphical patterns of ridges and valleys on the surface of fingertips. As illustrated in
Figure 1, ridge endings and ridge bifurcation are called “minutiae.” These features define the difference
between two individuals’ fingerprints, making this technology possible. Fingerprint recognition systems are
possible thanks to two fingerprint characteristics: invariance and singularity. These characteristics basically
imply that the fingerprint is unique and it does not change through life [11].
Figure 1. Different ridge features on a fingerprint image [11]
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2346 - 2353
2348
A fingerprint sensor is an electronic device used to capture an image of the fingerprint pattern.
The captured image is digitally processed to create a biometric template (a collection of extracted features)
that is stored and used for matching. Typical fingerprint sensor technologies include optical sensors,
capacitive sensors, RF capacitive sensors, pressure sensors, thermal sensors, and ultra-sound sensors.
The optical fingerprint sensors use frustrated refraction over a glass prism (when the skin touches the glass,
the light is not reflected but absorbed). The finger is illuminated from one side by an LED while the other
side transmits the image through a lens to a camera as shown in Figure 2 [21].
Figure 2. Optical fingerprint sensor technology [21]
2.1. Image processing stages
The FZ1036G is an optical fingerprint sensor with an embedded microcontroller that carries out the
image processing phase. The next three stages are as follows [21]:
2.1.1. Image acquisition
This stage refers to capturing the image of the fingerprint pattern.
2.1.2. Image pre-processing
The purpose of this stage is to increase the clarity of the captured fingerprint pattern. Some typical
image pre-processing techniques are image segmentation, binarization, elimination of noise, smoothing, and
thinning. These techniques basically help remove unwanted data from the pattern [21].
2.1.3. Feature extraction
This stage refers to extracting the features that make fingerprints unique with respect to ridge
endings and bifurcations. The most common method to extract these features is called the “crossing number”
(CN) approach. This method involves skeletonization of the image and extraction of the minutiae. The CN
value is then computed. The CN is defined as half the sum of the differences between pairs of adjacent pixels
in the eight-neighborhood pixels. Mathematically, the CN for a pixel 𝑃 is given by (1) [22]:
𝐶𝑁 =
1
2
∑8
𝑖=1 |𝑃𝑖 − 𝑃𝑖−1|, 𝑃9 = 𝑃1, (1)
where 𝑃𝑖 is the pixel value in the neighborhood of 𝑃. Once the CN is computed, the corresponding pixel can
be classified as a minutiae or non-minutiae point using Table 1.
Table 1. Crossing number property [22]
CN Property
0 Isolated point
1 Ridge ending point
2 Continuing ridge point
3 Bifurcation point
4 Crossing point
Int J Elec & Comp Eng ISSN: 2088-8708 
Portable and efficient fingerprint authentication system based on a … (Mauricio García Vargas)
2349
2.1.4. Matching
This is the stage where the comparison between the acquired pattern and the patterns stored in the
database is carried out.
2.2. Proposed fingerprint recognition system
The proposed fingerprint authentication system is divided into three blocks as shown in Figure 3.
Software and hardware implementation are implied. The system allows the user to choose between three
function modes: store fingerprint, delete fingerprint, and verify fingerprint. The modes can be selected by
pressing some hardware buttons. Image acquisition, which consists of creating the fingerprint and creating a
pattern, is done by the sensor. In the store fingerprint mode, this pattern is stored in the database; however,
in the verify fingerprint mode, the pattern is compared with the pattern that was previously stored in the
database. The desired function mode and the user`s fingerprint refer as system inputs or the variables that are
in charge of the user so that the system can perform the desired actions.
In the verification mode, the system generates an output authentication result. This is the block
where a device to be controlled is also implemented. There are three devices to be controlled that comprise
the output of the system: a buzzer, an LCD display, and a motor. The motor is in charge of opening and
closing the door depending on the result of the authentication. The buzzer is activated when the fingerprint
that is verified is not stored in the database and the LCD display shows the result of the authentication.
The program, made in MPLAB X IDE v3.65 and then burned into the microcontroller, consists of the logical
processes that the system has to perform.
Figure 3. Block diagrams
3. MATERIALS AND METHODS
The circuit used is shown in Figure 4. The system is powered by a 5 V DC source. The buttons are
used select the function mode. The button and output results use the I/O ports of the microcontroller.
The LCD is used so that the user can observe the state of the system. After the verification process,
the system displays a message to indicate whether the fingerprint image is stored in the database or not.
The materials used to build the fingerprint recognition system and their detailed descriptions are
listed in Table 2. Because the current requirement of the buzzer is low, it can be activated directly from the
output of the microcontroller. However, due to the motor current requirement, a transistor and an independent
DC voltage source are implemented to control power dissipated in the motor.
Communication between the fingerprint sensor and the microcontroller is by RS232 protocol.
Therefore, the reception pin of the sensor is connected to the transmission pin of the microcontroller and vice
versa. When communicating, the command/data/results are bundled in a data package format as described in
Table 3. Once the fingerprint sensor receives the commands, it will report the result by sending back an
“acknowledge” packet. This packet includes a 1-byte confirmation code that confirms whether the fingerprint
has been stored or not and if there is a matching result.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2346 - 2353
2350
Figure 4. System schematics
Table 2. Materials
Component Characteristics
Microcontroller PIC18f252 Operating frequency 20 MHz; serial communications: MSSP, addressable USART; I/O ports
Fingerprint sensor FZ1036G Interface: UART (TTL logical level); Baud rate: 9600 (default)
I2C LCD 16x2 Ref: DRF0063
Buzzer Variable voltage 3 V-15 V DC
Crystal 20 MHz
Button
Door prototype
Resistors, capacitors, LEDs
Normally open
3–5 V DC motor
Different values
Transistor NPN transistor; Ref: 2N2222
Table 3. Definition of data package taken from the fingerprint sensor datasheet
Name Symbol Length Description
Header START 2 bytes Fixed value of EF01H; High byte transferred first.
Adder ADDR 4 bytes Default value is 0xFFFFFFFF, which can be modified by command. High byte is
transferred first and at wrong adder value, module will reject to transfer.
01H: Command packet
Package
identifier
PID 1 byte 02H: Data packet; Data packet shall not appear alone in the executing process, must
follow command packet or acknowledge packet.
07H: Acknowledge packet
08H: End of data package
Package
Length
Length 2 bytes Refers to the length of package content (command packets and data packets) plus the
length of checksum (2 bytes). Unit is byte. Max. length is 256 bytes, and high byte is
transferred first.
Package
contents
DATA - It can be commands, data, command parameters, acknowledge result, etc. (fingerprint
character value, template are all deemed as data).
Checksum SUM 2 bytes The arithmetic sum of package identifier, package length, and all package contents.
Overflowing bits are omitted. High byte is transferred first.
Int J Elec & Comp Eng ISSN: 2088-8708 
Portable and efficient fingerprint authentication system based on a … (Mauricio García Vargas)
2351
4. RESULTS AND ANALYSIS
The experimental set-up is shown in Figure 5. It was designed as a door prototype to illustrate the
system’s functionality. The DC voltage source is used as the voltage source for the entire system including
the fingerprint sensor, the LCD display, and the microcontroller.
Figure 5. Experimental set-up
As explained in Section 2.2, an independent DC voltage source and a transistor were implemented
to control the power dissipated in the motor. The interesting fact about this is that it is possible to use any
kind of motor by simply replacing the independent voltage source with the corresponding one and using an
element such as a relay or a power transistor to control the power dissipated in the motor. The importance of
this resides in being able to implement the system in any kind of application that uses any kind of motor.
Three trials were conducted to test the functioning of the system.
4.1. Storing mode test
To carry out this test, four people were chosen-two females and two males. The idea was to measure
the effectiveness of the system when storing a fingerprint. Each person made 30 attempts to store their
fingerprint. The results are shown in Table 4.
Table 4. Storing test results
Person Gender Attempts Stored Not Stored Percentage Stored
Person 1 Male 30 27 3 90%
Person 2 Male 30 28 2 93.3%
Person 3 Female 30 28 2 93.3%
Person 4 Female 30 27 3 90%
Average 91.7%
The results show that the system is effective when storing fingerprints; moreover, no relation was
found between the gender of the people and the effectiveness. When storing a fingerprint, the user has to
place their finger on the scanner twice in succession to allow the device to compare them and store the better
image. This may explain the times the fingerprint was not stored as the fingerprints must be exactly the same
both times for it to be stored. It could also be due to inconsistent finger placement.
4.2. Verification mode test
Four people two females and two males were used also to test the system’s fingerprint verification
function (i.e., verification mode). Each person made 30 attempts to verify their print (the fingerprint of each
system was previously stored). The time to perform the verification was found to be less than 1 s. The results
are shown in Table 5.
Table 5. Verification test results
Person Gender Attempts Verified Not Verified Percentage Verified
Person 1 Male 30 29 1 96.6 %
Person 2 Male 30 28 2 93.3 %
Person 3 Female 30 29 2 96.6 %
Person 4 Female 30 29 1 96.6 %
Average 95.8 %
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2346 - 2353
2352
The results show that the system is more effective when verifying fingerprints; moreover,
no relation between the gender of the people and the effectiveness was found. When verifying the fingerprint,
the user only has to place their finger once, which makes it easier for the system to verify. The times the
fingerprint was not verified can be due to inconsistent finger placement.
4.3. Angle placement test
The functioning of the system is dependent on the angle at which the person places their finger.
To test this dependence, a finger was gradually place on the sensor at different angles with the purpose of
verifying or storing its fingerprint. It was found out that there is no relation between the angle at which the
user places their finger and the verification or storage functions; that is, it does not matter how the user places
their finger on the fingerprint sensor as it does not affect the results. This is explained by the way the system
performs the matching process. As explained in Section 2.1.3, during the feature extraction, the system
extracts the minutiae from the fingerprint pattern and uses this to perform the matching. It is important to
mention that even though the angle of placement changes during the test, the user always places the same
area of their finger on the fingerprint sensor, which means the system always extracts the same minutiae and
the matching result is not affected.
5. CONCLUSION
In this work, we have developed a portable and efficient fingerprint authentication system.
The system employs an optical fingerprint sensor with an embedded microcontroller that performs effective
image processing. Moreover, the system can be easily implemented to supply any kind of authentication such
as for home safety, automobile safety, and security boxes. The performance evaluation shows encouraging
results. There is no effect of user gender or the angle at which they place their finger on the verification and
storage of the fingerprint. The system is effective when verifying and storing fingerprints and the process of
matching takes no more than 1 second. The results show that the percentage of verified fingerprints (95.8%)
was higher than the percentage stored (91.7%). This is because when storing a fingerprint, the user has to
place their finger on the sensors in two successive motions, creating a higher possibility of failure in storing
the fingerprint.
ACKNOWLEDGEMENTS
The authors thank to the School of Physics, and the Department of Electrical Engineering and
Automation for the valuable support to conduct this research. This work was supported by the Universidad
Nacional de Colombia, Sede Medellín under the projects HERMES-34671 and HERMES-36911.
REFERENCES
[1] P. Schuch and S. Schulz, and C. Busch. “Survey on the impact of fingerprint image enhancement," IET Biometrics,
vol. 7, pp. 102-115, 2018.
[2] H. Xu, R. Veldhuis, T. Kevenaar and T. Akkermans. “A Fast Minutiae-Based Fingerprint Recognition System,"
IEEE systems journal, vol. 3, No. 4 pp. 418-427, December 2009.
[3] M. Ghafoor, S. Iqbal, S. Tariq, I. Taj and N. Jafri. “Efficient fingerprint matching using GPU," IET image process,
vol. 12, pp. 274-284, 2018.
[4] A. Y. Shdefat, M. Joo, S. Choi, H. Kim, “Utilizing ECG Waveform Features as New Biometric Authentication
Method,” International Journal of Electrical and Computer Engineering (IJECE), Vol. 8, No. 2, pp. 658~665,
April 2018.
[5] I. Dror and J. Mnookin. “The use of technology in human expert domains: challenges and risks arising from the use
of automated fingerprint identification systems in forensic science," Oxfords journals, vol. 9, pp. 47-67, January 22,
2010.
[6] F. Ishengoma. “Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint
Recognition Technologies," 2014.
[7] J. Arcenegui, R. Arjona, and I. Baturone. “Demonstrator of a fingerprint recognition algorithm into a low-power
microcontroller," Conference on Design and Architectures for Signal and Image Processing (DASIP), pp. 1-2,
2017.
[8] Fahad-Bin-Mazhar, O. Ahamed, and M. Rasedujjaman, “Biometric smart attendance kit with fingerprint scanner by
using microcontroller," International Conference on Electrical and Electronic Engineering (ICEEE), pp. 13-16,
2015.
[9] J. Han, “Fingerprint Authentication Schemes for Mobile Devices,” International Journal of Electrical and
Computer Engineering (IJECE), Vol. 5, No. 3, pp. 579~585, June 2015.
Int J Elec & Comp Eng ISSN: 2088-8708 
Portable and efficient fingerprint authentication system based on a … (Mauricio García Vargas)
2353
[10] A. Jain, L. Hong, S. Pankanti and R. Bolle. “An Identity-Authentication System Using Fingerprints," Proceedings of
the IEEE, vol. 85, No. 9, September 1997.
[11] Mouad. Ali, Vivek. H, Pravin. Y, and Gaikwad A., “Overview of fingerprint recognition system," International
Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 1334-1338, 2016.
[12] R. Gil, G. Orueta, M. Tawfik, F. Garcia-Loro, A. Pesquera, E. Sancristobal, S. Martín and M. Castro. “Fingerprint
Verification System in Tests in Moodle," IEEE journal of Latin America Learning Technologies, vol. 8, No. 1,
February 2013.
[13] N. A. Rakib, SM Z. Farhan, Md M. B. Sobhan, J. Uddin, A. Habib, “A Novel 2D Feature Extraction Method for
Fingerprints Using Minutiae Points and Their Intersections,” International Journal of Electrical and Computer
Engineering (IJECE), Vol. 7, No. 5, pp. 2547~2554, October 2017.
[14] M. Martin, K. Štefan, F. Ľubor, “Biometrics Authentication of Fingerprint with Using Fingerprint Reader and
Microcontroller Arduino,” TELKOMNIKA Telecommunication Computing Electronics and Control, Vol.16, No.2,
pp. 755~765, April 2018.
[15] T. Khan, D. Bailey, M.Khan and Y. Kong. “Efficient Hardware Implementation For Fingerprint Image
Enhancement Using Anisotropic Gaussian Filter," IEEE transactions on image processing, vol. 14, No. 8,
June 2016.
[16] N. Galy, B. Charlot and B. Courtois. “A Full Fingerprint Verification System for a Single-Line Sweep Sensor,"
IEEE sensor journal, vol. 7, No. 7, July 2007.
[17] S. Jung, J. Nam, D. Yang, and M. Lee. “A CMOS Integrated Capacitive Fingerprint Sensor With 32-bit RISC
Microcontroller," IEEE journal of solid-state circuits, vol. 40, no. 8, August 2005.
[18] A. S. Shinde and V. Bendre, “An Embedded Fingerprint Authentication System," International Conference on
Computing Communication Control and Automation, pp. 205-208, 2015.
[19] P. Gupta, S. Ravi, A. Raghunathan, and N. K. Jha, “Efficient fingerprint-based user authentication for embedded
systems," Proceedings of the 42nd annual conference on Design automation - DAC `05, pp. 244, 2005.
[20] S. R. Borra, G. J. Reddy, E. S. Reddy, “An Efficient Fingerprint Identification using Neural Network and BAT
Algorithm,” International Journal of Electrical and Computer Engineering (IJECE), Vol. 8, No. 2, pp. 1194~1213,
April 2018.
[21] Lunji Qiu. “Fingerprint sensor technology," IEEE 9th Conference on Industrial Electronics and Applications
(ICIEA), Shanghai, China, 2014.
[22] A. Chaudhari, G. Patnaik, S. Patil. “Implementation of Minutiae Based Fingerprint Identification System Using
Crossing Number Concept," Informatica Economica, vol. 18, No. 1, 2014.
BIOGRAPHIES OF AUTHORS
Mauricio García Vargas Engineering physics student, Science Faculty, Universidad
Nacional de Colombia, Medellín, Colombia, E-mail: maugarciavar@unal.edu.co.
His research interests include applied electronics and physics.
Fredy Edimer Hoyos Electrical Engineer, MEng Industrial Automation, Ph.D in
Automation. Assistant professor, Science Faculty, School of Physics, Universidad
Nacional de Colombia Sede Medellín, Colombia, E-mail: fehoyosve@unal.edu.co.
His research interests include nonlinear control, nonlinear dynamics of nonsmooth
systems, and power electronic applications. He is a member of the Applied
Technologies Research Group-GITA, at the Universidad Nacional de Colombia.
https://orcid.org/0000-0001-8766-5192
John Candelo received his BS degree in Electrical Engineering in 2002 and his PhD in
Engineering with emphasis in Electrical Engineering in 2009 from the Universidad del
Valle, Cali - Colombia. His employment experiences include the Empresa de Energía
del Pacífico EPSA, Universidad del Norte, and the Universidad Nacional de Colombia
- Sede Medellín. He is now an Assistant Professor of the Universidad Nacional de
Colombia - Sede Medellín, Colombia. His research interests include: engineering
education, planning, operation, and control of power systems; artificial intelligence;
and smart grids. He is a member of the Applied Technologies Research Group-GITA,
at the Universidad Nacional de Colombia. https://orcid.org/0000-0002-9784-9494.

More Related Content

What's hot

Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting SystemIJMTST Journal
 
Measuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints datasetMeasuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints datasetTELKOMNIKA JOURNAL
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiNishikant Taksande
 
Offline and online signature verification systems a survey
Offline and online signature verification systems a surveyOffline and online signature verification systems a survey
Offline and online signature verification systems a surveyeSAT Publishing House
 
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...IJERA Editor
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...IOSR Journals
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
 
IRJET- A Survey on Control of Mechanical ARM based on Hand Gesture Recognitio...
IRJET- A Survey on Control of Mechanical ARM based on Hand Gesture Recognitio...IRJET- A Survey on Control of Mechanical ARM based on Hand Gesture Recognitio...
IRJET- A Survey on Control of Mechanical ARM based on Hand Gesture Recognitio...IRJET Journal
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voiceeSAT Publishing House
 
A Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmA Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmIOSR Journals
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingNabila mahjabin
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 

What's hot (17)

finger prints
finger printsfinger prints
finger prints
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
1834 1840
1834 18401834 1840
1834 1840
 
Measuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints datasetMeasuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints dataset
 
C6524029320
C6524029320C6524029320
C6524029320
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
 
Offline and online signature verification systems a survey
Offline and online signature verification systems a surveyOffline and online signature verification systems a survey
Offline and online signature verification systems a survey
 
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint Authentication
 
Fingerprints recognition
Fingerprints recognitionFingerprints recognition
Fingerprints recognition
 
IRJET- A Survey on Control of Mechanical ARM based on Hand Gesture Recognitio...
IRJET- A Survey on Control of Mechanical ARM based on Hand Gesture Recognitio...IRJET- A Survey on Control of Mechanical ARM based on Hand Gesture Recognitio...
IRJET- A Survey on Control of Mechanical ARM based on Hand Gesture Recognitio...
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
A Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmA Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition Algorithm
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 

Similar to Portable Fingerprint Authentication System Based on Microcontroller

PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
Real time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontrollerReal time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontrollernooriasukmaningtyas
 
Gesture Recognition System
Gesture Recognition SystemGesture Recognition System
Gesture Recognition SystemIRJET Journal
 
SLIDE PRESENTATION BY HAND GESTURE RECOGNITION USING MACHINE LEARNING
SLIDE PRESENTATION BY HAND GESTURE RECOGNITION USING MACHINE LEARNINGSLIDE PRESENTATION BY HAND GESTURE RECOGNITION USING MACHINE LEARNING
SLIDE PRESENTATION BY HAND GESTURE RECOGNITION USING MACHINE LEARNINGIRJET Journal
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
 
Media Control Using Hand Gesture Moments
Media Control Using Hand Gesture MomentsMedia Control Using Hand Gesture Moments
Media Control Using Hand Gesture MomentsIRJET Journal
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithmijcisjournal
 
IRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET Journal
 
IRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture RecognitionIRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture RecognitionIRJET Journal
 
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardDevelopment of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardWaqas Tariq
 
Virtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect SensorVirtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect SensorIRJET Journal
 
Offline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsOffline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsTELKOMNIKA JOURNAL
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionIRJET Journal
 

Similar to Portable Fingerprint Authentication System Based on Microcontroller (20)

PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
Real time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontrollerReal time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontroller
 
Gesture Recognition System
Gesture Recognition SystemGesture Recognition System
Gesture Recognition System
 
SLIDE PRESENTATION BY HAND GESTURE RECOGNITION USING MACHINE LEARNING
SLIDE PRESENTATION BY HAND GESTURE RECOGNITION USING MACHINE LEARNINGSLIDE PRESENTATION BY HAND GESTURE RECOGNITION USING MACHINE LEARNING
SLIDE PRESENTATION BY HAND GESTURE RECOGNITION USING MACHINE LEARNING
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
 
M017637484
M017637484M017637484
M017637484
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
 
D56021216
D56021216D56021216
D56021216
 
Media Control Using Hand Gesture Moments
Media Control Using Hand Gesture MomentsMedia Control Using Hand Gesture Moments
Media Control Using Hand Gesture Moments
 
E0543135
E0543135E0543135
E0543135
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
 
IRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb People
 
1834 1840
1834 18401834 1840
1834 1840
 
IRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture RecognitionIRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture Recognition
 
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardDevelopment of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
 
Virtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect SensorVirtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect Sensor
 
Offline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbandsOffline signatures matching using haar wavelet subbands
Offline signatures matching using haar wavelet subbands
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

Portable Fingerprint Authentication System Based on Microcontroller

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 9, No. 4, August 2019, pp. 2346~2353 ISSN: 2088-8708, DOI: 10.11591/ijece.v9i4.pp2346-2353  2346 Journal homepage: http://iaescore.com/journals/index.php/IJECE Portable and efficient fingerprint authentication system based on a microcontroller Mauricio García Vargas1 , Fredy E. Hoyos2 , John E. Candelo3 1,2 Escuela de Física, Facultad de Ciencias, Sede Medellín, Universidad Nacional de Colombia, Colombia 3 Departmento de Energía Eléctrica y Automática, Facultad de Minas, Sede Medellín, Universidad Nacional de Colombia, Colombia Article Info ABSTRACT Article history: Received Apr 12, 2018 Revised Mar 5, 2019 Accepted Mar 11, 2019 This paper presents the design of a fingerprint authentication system based on a simple microcontroller and the fingerprint sensor. The circuit diagram and details regarding the procedure are included. The system was programed in MPLAB and then embedded into the microcontroller. Communication between the PIC and sensor is by RS232 protocol. The results show that the system recognizes the fingerprint in less than 1 second. It is portable and there is no need for image processing. Furthermore, the system shows a high effectiveness when storing and verifying fingerprints. Keywords: Authentication Fingerprint sensor Microcontroller Copyright © 2019 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Fredy Edimer Hoyos Universidad Nacional de Colombia, Sede Medellín Calle 59A No. 63-20, Medellín, Colombia. Telephone: (574) 4309327 Email: fehoyosve@unal.edu.co 1. INTRODUCTION Nowadays, security is one of the most significant necessities in society and the demand for highly secure authentication systems is increasing all over the world. In this context, biometrics plays an important role. Biometrics refers to the use of distinctive anatomical and behavioral characteristics for automatically recognizing individuals [1]. The importance of biometrics is in the fact that the anatomical and behavioral characteristics of an individual cannot be misplaced, shared, or copied. Among all biometric technologies, fingerprint analysis is universally used due to its easy acquisition, high distinctiveness, persistence, and acceptance by the public [2, 3]; however, other technologies, such as ECG waveform features, are also found in the literature [4]. Fingerprint recognition has been used in home safety, forensic applications, smartphones, security boxes, smart homes, and even as a work or classroom attendance system [5-9]. Any fingerprint recognition system includes four phases: acquisition, representation (template), feature extraction, and matching [10]. Because the sensor used in this paper carries out the pre- and post-processing of the digital image independently, we can talk about two phases: the enrollment and the matching phase. During the enrollment process, the fingerprint is captured and stored in a database and during the recognition process the fingerprint is captured and compared with all the fingerprints that are stored in that database. This is known as (1:N) matching and helps identify a particular person’s fingerprint (1:1). Matching refers to comparing the captured fingerprint with another fingerprint previously enrolled in the database [11] and is commonly used for authentication. There are several publications about fingerprint recognition. In [12], a fingerprint authentication system is implemented and applied in distance education where courses are developed in learning
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Portable and efficient fingerprint authentication system based on a … (Mauricio García Vargas) 2347 management systems. A pre-processing of the image was carried out to remove noise and apply a filter to the pattern. In [13], a feature extraction method using minutiae points is proposed. Minutiae points are also used in this paper for fingerprint authentication. In [14], a biometric fingerprint system is designed using Arduino and a fingerprint sensor R305. In [15], a fingerprint system is proposed and tested using an image filtering technique that improves the speed of the system. For real-time implementation, the system is tested using an FPGA (Field Programmable Gate Array). In [16], authors present a fingerprint verification system using a sweep, tactile fingerprint sensor, and an FPGA. The functioning of the system is explained in detail. In [17], an authentication system is implemented using a capacitive fingerprint sensor that embeds a 32-bit microcontroller. In [7], the authors demonstrate the performance of a fingerprint recognition system implemented with an ARM Cortex-M3 microcontroller and an FPC1011F3 capacitive sensor; the final algorithm was also tried in a Raspberry Pi 2 to display the matching results in a Graphical User Interface (GUI). In [18], a fingerprint authentication system is implemented using an FPGA and the processing of the image is carried out. The authors suggest the low cost of the system is due to using the FPGA. Finally, in [19], a fingerprint-based user authentication system is implemented using a T1050.3 Xtensa processor and an AES3400 fingerprint sensor. The sensor is connected to the processor, where the processing of the image is carried out using specific software. Matching results are shown in the processor; however, none of these publications show the schematic of the corresponding circuits and details of the procedure to carry out the hardware implementation. Additionally, [12, 13, 15, 18, 19, 20] carry out an image processing phase that makes the system complex and reduces its portability. This image processing phase is internally carried out by the fingerprint sensor FZ1036G used for this paper. This is possible due to an embedded microcontroller. In [14, 17], the authors also use a fingerprint sensor with an embedded microcontroller to perform image processing. In this paper, we present the design of a fingerprint authentication system using the microcontroller PIC18f252 and the fingerprint sensor FZ1036G, and implement (1:1) matching. The program is made in MPLAB X IDE v3.65 and then burned into the microcontroller. Once the microcontroller is programmed, the system consists only of the microcontroller and the fingerprint sensor, thus making it portable and efficient. Communication between the PIC and the sensor is by RS232 protocol. The main contribution of this paper is that due to the sensor capacity, the proposed system is able to acquire or match a fingerprint image in less than 1 s. In addition, because the fingerprint sensor has an embedded microcontroller that is in charge of the image processing, there is no need to implement an image processing phase. Moreover, the circuit diagram and details regarding the procedure are shown. The rest of the paper is divided into four sections. Section 2 presents the model used in fingerprint recognition. Section 3 describes the materials, methods used to build the fingerprint recognition system, and the procedures. Section 4 presents the tests, the results, the analysis, and discussion. Finally, Section 5 concludes. 2. MODELING OF FINGERPRINT RECOGNITION SYSTEM Fingerprints are graphical patterns of ridges and valleys on the surface of fingertips. As illustrated in Figure 1, ridge endings and ridge bifurcation are called “minutiae.” These features define the difference between two individuals’ fingerprints, making this technology possible. Fingerprint recognition systems are possible thanks to two fingerprint characteristics: invariance and singularity. These characteristics basically imply that the fingerprint is unique and it does not change through life [11]. Figure 1. Different ridge features on a fingerprint image [11]
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2346 - 2353 2348 A fingerprint sensor is an electronic device used to capture an image of the fingerprint pattern. The captured image is digitally processed to create a biometric template (a collection of extracted features) that is stored and used for matching. Typical fingerprint sensor technologies include optical sensors, capacitive sensors, RF capacitive sensors, pressure sensors, thermal sensors, and ultra-sound sensors. The optical fingerprint sensors use frustrated refraction over a glass prism (when the skin touches the glass, the light is not reflected but absorbed). The finger is illuminated from one side by an LED while the other side transmits the image through a lens to a camera as shown in Figure 2 [21]. Figure 2. Optical fingerprint sensor technology [21] 2.1. Image processing stages The FZ1036G is an optical fingerprint sensor with an embedded microcontroller that carries out the image processing phase. The next three stages are as follows [21]: 2.1.1. Image acquisition This stage refers to capturing the image of the fingerprint pattern. 2.1.2. Image pre-processing The purpose of this stage is to increase the clarity of the captured fingerprint pattern. Some typical image pre-processing techniques are image segmentation, binarization, elimination of noise, smoothing, and thinning. These techniques basically help remove unwanted data from the pattern [21]. 2.1.3. Feature extraction This stage refers to extracting the features that make fingerprints unique with respect to ridge endings and bifurcations. The most common method to extract these features is called the “crossing number” (CN) approach. This method involves skeletonization of the image and extraction of the minutiae. The CN value is then computed. The CN is defined as half the sum of the differences between pairs of adjacent pixels in the eight-neighborhood pixels. Mathematically, the CN for a pixel 𝑃 is given by (1) [22]: 𝐶𝑁 = 1 2 ∑8 𝑖=1 |𝑃𝑖 − 𝑃𝑖−1|, 𝑃9 = 𝑃1, (1) where 𝑃𝑖 is the pixel value in the neighborhood of 𝑃. Once the CN is computed, the corresponding pixel can be classified as a minutiae or non-minutiae point using Table 1. Table 1. Crossing number property [22] CN Property 0 Isolated point 1 Ridge ending point 2 Continuing ridge point 3 Bifurcation point 4 Crossing point
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Portable and efficient fingerprint authentication system based on a … (Mauricio García Vargas) 2349 2.1.4. Matching This is the stage where the comparison between the acquired pattern and the patterns stored in the database is carried out. 2.2. Proposed fingerprint recognition system The proposed fingerprint authentication system is divided into three blocks as shown in Figure 3. Software and hardware implementation are implied. The system allows the user to choose between three function modes: store fingerprint, delete fingerprint, and verify fingerprint. The modes can be selected by pressing some hardware buttons. Image acquisition, which consists of creating the fingerprint and creating a pattern, is done by the sensor. In the store fingerprint mode, this pattern is stored in the database; however, in the verify fingerprint mode, the pattern is compared with the pattern that was previously stored in the database. The desired function mode and the user`s fingerprint refer as system inputs or the variables that are in charge of the user so that the system can perform the desired actions. In the verification mode, the system generates an output authentication result. This is the block where a device to be controlled is also implemented. There are three devices to be controlled that comprise the output of the system: a buzzer, an LCD display, and a motor. The motor is in charge of opening and closing the door depending on the result of the authentication. The buzzer is activated when the fingerprint that is verified is not stored in the database and the LCD display shows the result of the authentication. The program, made in MPLAB X IDE v3.65 and then burned into the microcontroller, consists of the logical processes that the system has to perform. Figure 3. Block diagrams 3. MATERIALS AND METHODS The circuit used is shown in Figure 4. The system is powered by a 5 V DC source. The buttons are used select the function mode. The button and output results use the I/O ports of the microcontroller. The LCD is used so that the user can observe the state of the system. After the verification process, the system displays a message to indicate whether the fingerprint image is stored in the database or not. The materials used to build the fingerprint recognition system and their detailed descriptions are listed in Table 2. Because the current requirement of the buzzer is low, it can be activated directly from the output of the microcontroller. However, due to the motor current requirement, a transistor and an independent DC voltage source are implemented to control power dissipated in the motor. Communication between the fingerprint sensor and the microcontroller is by RS232 protocol. Therefore, the reception pin of the sensor is connected to the transmission pin of the microcontroller and vice versa. When communicating, the command/data/results are bundled in a data package format as described in Table 3. Once the fingerprint sensor receives the commands, it will report the result by sending back an “acknowledge” packet. This packet includes a 1-byte confirmation code that confirms whether the fingerprint has been stored or not and if there is a matching result.
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2346 - 2353 2350 Figure 4. System schematics Table 2. Materials Component Characteristics Microcontroller PIC18f252 Operating frequency 20 MHz; serial communications: MSSP, addressable USART; I/O ports Fingerprint sensor FZ1036G Interface: UART (TTL logical level); Baud rate: 9600 (default) I2C LCD 16x2 Ref: DRF0063 Buzzer Variable voltage 3 V-15 V DC Crystal 20 MHz Button Door prototype Resistors, capacitors, LEDs Normally open 3–5 V DC motor Different values Transistor NPN transistor; Ref: 2N2222 Table 3. Definition of data package taken from the fingerprint sensor datasheet Name Symbol Length Description Header START 2 bytes Fixed value of EF01H; High byte transferred first. Adder ADDR 4 bytes Default value is 0xFFFFFFFF, which can be modified by command. High byte is transferred first and at wrong adder value, module will reject to transfer. 01H: Command packet Package identifier PID 1 byte 02H: Data packet; Data packet shall not appear alone in the executing process, must follow command packet or acknowledge packet. 07H: Acknowledge packet 08H: End of data package Package Length Length 2 bytes Refers to the length of package content (command packets and data packets) plus the length of checksum (2 bytes). Unit is byte. Max. length is 256 bytes, and high byte is transferred first. Package contents DATA - It can be commands, data, command parameters, acknowledge result, etc. (fingerprint character value, template are all deemed as data). Checksum SUM 2 bytes The arithmetic sum of package identifier, package length, and all package contents. Overflowing bits are omitted. High byte is transferred first.
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Portable and efficient fingerprint authentication system based on a … (Mauricio García Vargas) 2351 4. RESULTS AND ANALYSIS The experimental set-up is shown in Figure 5. It was designed as a door prototype to illustrate the system’s functionality. The DC voltage source is used as the voltage source for the entire system including the fingerprint sensor, the LCD display, and the microcontroller. Figure 5. Experimental set-up As explained in Section 2.2, an independent DC voltage source and a transistor were implemented to control the power dissipated in the motor. The interesting fact about this is that it is possible to use any kind of motor by simply replacing the independent voltage source with the corresponding one and using an element such as a relay or a power transistor to control the power dissipated in the motor. The importance of this resides in being able to implement the system in any kind of application that uses any kind of motor. Three trials were conducted to test the functioning of the system. 4.1. Storing mode test To carry out this test, four people were chosen-two females and two males. The idea was to measure the effectiveness of the system when storing a fingerprint. Each person made 30 attempts to store their fingerprint. The results are shown in Table 4. Table 4. Storing test results Person Gender Attempts Stored Not Stored Percentage Stored Person 1 Male 30 27 3 90% Person 2 Male 30 28 2 93.3% Person 3 Female 30 28 2 93.3% Person 4 Female 30 27 3 90% Average 91.7% The results show that the system is effective when storing fingerprints; moreover, no relation was found between the gender of the people and the effectiveness. When storing a fingerprint, the user has to place their finger on the scanner twice in succession to allow the device to compare them and store the better image. This may explain the times the fingerprint was not stored as the fingerprints must be exactly the same both times for it to be stored. It could also be due to inconsistent finger placement. 4.2. Verification mode test Four people two females and two males were used also to test the system’s fingerprint verification function (i.e., verification mode). Each person made 30 attempts to verify their print (the fingerprint of each system was previously stored). The time to perform the verification was found to be less than 1 s. The results are shown in Table 5. Table 5. Verification test results Person Gender Attempts Verified Not Verified Percentage Verified Person 1 Male 30 29 1 96.6 % Person 2 Male 30 28 2 93.3 % Person 3 Female 30 29 2 96.6 % Person 4 Female 30 29 1 96.6 % Average 95.8 %
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2346 - 2353 2352 The results show that the system is more effective when verifying fingerprints; moreover, no relation between the gender of the people and the effectiveness was found. When verifying the fingerprint, the user only has to place their finger once, which makes it easier for the system to verify. The times the fingerprint was not verified can be due to inconsistent finger placement. 4.3. Angle placement test The functioning of the system is dependent on the angle at which the person places their finger. To test this dependence, a finger was gradually place on the sensor at different angles with the purpose of verifying or storing its fingerprint. It was found out that there is no relation between the angle at which the user places their finger and the verification or storage functions; that is, it does not matter how the user places their finger on the fingerprint sensor as it does not affect the results. This is explained by the way the system performs the matching process. As explained in Section 2.1.3, during the feature extraction, the system extracts the minutiae from the fingerprint pattern and uses this to perform the matching. It is important to mention that even though the angle of placement changes during the test, the user always places the same area of their finger on the fingerprint sensor, which means the system always extracts the same minutiae and the matching result is not affected. 5. CONCLUSION In this work, we have developed a portable and efficient fingerprint authentication system. The system employs an optical fingerprint sensor with an embedded microcontroller that performs effective image processing. Moreover, the system can be easily implemented to supply any kind of authentication such as for home safety, automobile safety, and security boxes. The performance evaluation shows encouraging results. There is no effect of user gender or the angle at which they place their finger on the verification and storage of the fingerprint. The system is effective when verifying and storing fingerprints and the process of matching takes no more than 1 second. The results show that the percentage of verified fingerprints (95.8%) was higher than the percentage stored (91.7%). This is because when storing a fingerprint, the user has to place their finger on the sensors in two successive motions, creating a higher possibility of failure in storing the fingerprint. ACKNOWLEDGEMENTS The authors thank to the School of Physics, and the Department of Electrical Engineering and Automation for the valuable support to conduct this research. This work was supported by the Universidad Nacional de Colombia, Sede Medellín under the projects HERMES-34671 and HERMES-36911. REFERENCES [1] P. Schuch and S. Schulz, and C. Busch. “Survey on the impact of fingerprint image enhancement," IET Biometrics, vol. 7, pp. 102-115, 2018. [2] H. Xu, R. Veldhuis, T. Kevenaar and T. Akkermans. “A Fast Minutiae-Based Fingerprint Recognition System," IEEE systems journal, vol. 3, No. 4 pp. 418-427, December 2009. [3] M. Ghafoor, S. Iqbal, S. Tariq, I. Taj and N. Jafri. “Efficient fingerprint matching using GPU," IET image process, vol. 12, pp. 274-284, 2018. [4] A. Y. Shdefat, M. Joo, S. Choi, H. Kim, “Utilizing ECG Waveform Features as New Biometric Authentication Method,” International Journal of Electrical and Computer Engineering (IJECE), Vol. 8, No. 2, pp. 658~665, April 2018. [5] I. Dror and J. Mnookin. “The use of technology in human expert domains: challenges and risks arising from the use of automated fingerprint identification systems in forensic science," Oxfords journals, vol. 9, pp. 47-67, January 22, 2010. [6] F. Ishengoma. “Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies," 2014. [7] J. Arcenegui, R. Arjona, and I. Baturone. “Demonstrator of a fingerprint recognition algorithm into a low-power microcontroller," Conference on Design and Architectures for Signal and Image Processing (DASIP), pp. 1-2, 2017. [8] Fahad-Bin-Mazhar, O. Ahamed, and M. Rasedujjaman, “Biometric smart attendance kit with fingerprint scanner by using microcontroller," International Conference on Electrical and Electronic Engineering (ICEEE), pp. 13-16, 2015. [9] J. Han, “Fingerprint Authentication Schemes for Mobile Devices,” International Journal of Electrical and Computer Engineering (IJECE), Vol. 5, No. 3, pp. 579~585, June 2015.
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  Portable and efficient fingerprint authentication system based on a … (Mauricio García Vargas) 2353 [10] A. Jain, L. Hong, S. Pankanti and R. Bolle. “An Identity-Authentication System Using Fingerprints," Proceedings of the IEEE, vol. 85, No. 9, September 1997. [11] Mouad. Ali, Vivek. H, Pravin. Y, and Gaikwad A., “Overview of fingerprint recognition system," International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 1334-1338, 2016. [12] R. Gil, G. Orueta, M. Tawfik, F. Garcia-Loro, A. Pesquera, E. Sancristobal, S. Martín and M. Castro. “Fingerprint Verification System in Tests in Moodle," IEEE journal of Latin America Learning Technologies, vol. 8, No. 1, February 2013. [13] N. A. Rakib, SM Z. Farhan, Md M. B. Sobhan, J. Uddin, A. Habib, “A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points and Their Intersections,” International Journal of Electrical and Computer Engineering (IJECE), Vol. 7, No. 5, pp. 2547~2554, October 2017. [14] M. Martin, K. Štefan, F. Ľubor, “Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Microcontroller Arduino,” TELKOMNIKA Telecommunication Computing Electronics and Control, Vol.16, No.2, pp. 755~765, April 2018. [15] T. Khan, D. Bailey, M.Khan and Y. Kong. “Efficient Hardware Implementation For Fingerprint Image Enhancement Using Anisotropic Gaussian Filter," IEEE transactions on image processing, vol. 14, No. 8, June 2016. [16] N. Galy, B. Charlot and B. Courtois. “A Full Fingerprint Verification System for a Single-Line Sweep Sensor," IEEE sensor journal, vol. 7, No. 7, July 2007. [17] S. Jung, J. Nam, D. Yang, and M. Lee. “A CMOS Integrated Capacitive Fingerprint Sensor With 32-bit RISC Microcontroller," IEEE journal of solid-state circuits, vol. 40, no. 8, August 2005. [18] A. S. Shinde and V. Bendre, “An Embedded Fingerprint Authentication System," International Conference on Computing Communication Control and Automation, pp. 205-208, 2015. [19] P. Gupta, S. Ravi, A. Raghunathan, and N. K. Jha, “Efficient fingerprint-based user authentication for embedded systems," Proceedings of the 42nd annual conference on Design automation - DAC `05, pp. 244, 2005. [20] S. R. Borra, G. J. Reddy, E. S. Reddy, “An Efficient Fingerprint Identification using Neural Network and BAT Algorithm,” International Journal of Electrical and Computer Engineering (IJECE), Vol. 8, No. 2, pp. 1194~1213, April 2018. [21] Lunji Qiu. “Fingerprint sensor technology," IEEE 9th Conference on Industrial Electronics and Applications (ICIEA), Shanghai, China, 2014. [22] A. Chaudhari, G. Patnaik, S. Patil. “Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept," Informatica Economica, vol. 18, No. 1, 2014. BIOGRAPHIES OF AUTHORS Mauricio García Vargas Engineering physics student, Science Faculty, Universidad Nacional de Colombia, Medellín, Colombia, E-mail: maugarciavar@unal.edu.co. His research interests include applied electronics and physics. Fredy Edimer Hoyos Electrical Engineer, MEng Industrial Automation, Ph.D in Automation. Assistant professor, Science Faculty, School of Physics, Universidad Nacional de Colombia Sede Medellín, Colombia, E-mail: fehoyosve@unal.edu.co. His research interests include nonlinear control, nonlinear dynamics of nonsmooth systems, and power electronic applications. He is a member of the Applied Technologies Research Group-GITA, at the Universidad Nacional de Colombia. https://orcid.org/0000-0001-8766-5192 John Candelo received his BS degree in Electrical Engineering in 2002 and his PhD in Engineering with emphasis in Electrical Engineering in 2009 from the Universidad del Valle, Cali - Colombia. His employment experiences include the Empresa de Energía del Pacífico EPSA, Universidad del Norte, and the Universidad Nacional de Colombia - Sede Medellín. He is now an Assistant Professor of the Universidad Nacional de Colombia - Sede Medellín, Colombia. His research interests include: engineering education, planning, operation, and control of power systems; artificial intelligence; and smart grids. He is a member of the Applied Technologies Research Group-GITA, at the Universidad Nacional de Colombia. https://orcid.org/0000-0002-9784-9494.