This document provides an overview of fingerprint recognition as a biometric authentication method. It discusses the uniqueness of fingerprints and how they remain unchanged throughout a person's life. The document then describes how optical fingerprint sensors capture digital images of fingerprints using visible light. It explains some of the advantages and disadvantages of this sensing technique. Finally, it provides high-level descriptions of the components used in a fingerprint recognition circuit, including the microcontroller, reset circuitry, crystals, and an LCD display for output. The goal of the circuit is to authenticate a person's identity by matching their fingerprint to a stored template.
This document compares optical and magnetic rotary encoders, discussing their advantages and disadvantages. Optical encoders are more precise but have fragile internal mechanics that can fail in harsh environments due to vibration, moisture, or shaft misalignment. Magnetic encoders have fewer moving parts and are more durable, but earlier versions lacked precision. The document focuses on a magnetic encoder from Joral that is fully encapsulated, has no seals or bearings, and senses rotation non-contact through magnetic coupling, making it resistant to various environmental threats and misalignment issues.
Automation of wheel chair using ultrasonics and kinematics03meridaelinor
This document summarizes a paper presented at the NCCI 2010 conference on computational instrumentation in Chandigarh, India. The paper describes preliminary work developing an automated wheelchair controlled through eyeball and shoulder movements. Sensors detect eyeball position and direction through infrared light reflection. A capacitive sensor on the shoulder detects movement. Signals from these sensors direct the wheelchair's movement and an ultrasonic sensor detects obstacles. Testing on normal and hemiplegic patients found the sensors reliably detected eye and shoulder movements to control wheelchair direction. The system aims to help paralyzed people move independently through environments.
The document describes the APR9600 single-chip voice recording and playback integrated circuit from APLUS Integrated Circuits. Key features include 60 seconds of recording time, non-volatile flash memory, random and sequential access of multiple messages, and low power consumption. It provides detailed descriptions of the device's functionality in random access mode and tape mode, including recording and playback procedures in each mode. Block diagrams and pin descriptions are also included to explain the device's internal architecture and interface.
Electronic Hand Glove for Speed Impaired and Paralyzed PatientsIEEEP Karachi
This document describes an electronic hand glove designed to help people with speech impairments or paralysis communicate through gestures. It contains flex sensors that detect finger movements and a microcontroller that interprets the gestures using a lookup table to display letters on an LCD screen. The flex sensors are an economical and robust option that converts finger bends into electrical resistance. The glove allows people with signing abilities to communicate without others understanding sign language. It has applications for home devices, security, industries, biomedicine, and virtual reality. The gesture-based control provides an alternative to keyboards/mice and does not require the user or others to understand sign language.
The document describes a smart guide stick designed for blind people using ultrasonic sensors and an Arduino nano microcontroller. The stick detects nearby obstacles using ultrasonic sensors and notifies the user through a buzzer or vibration motor depending on the distance to the obstacle. This allows blind users to safely detect and navigate around obstacles. It can also help users locate the stick if it is misplaced using an RF module. The device aims to help blind people overcome common navigation challenges with a conventional walking stick.
This document describes an ultrasonic spectacles and waist-belt system for visually impaired and blind people. The system uses ultrasonic sensors to detect obstacles in front, left, and right directions up to 500cm away. It calculates the distance to detected objects and provides navigation guidance via prerecorded speech messages to help the user avoid obstacles. The system is controlled by a microcontroller that processes real-time sensor data and triggers the appropriate audio messages.
The document discusses biometric identification techniques including fingerprint, facial, and iris recognition. It covers the types of biometric systems used for applications like criminal justice, civil identification, and access control. The document also examines different fingerprint sensing and matching technologies as well as factors to consider for biometric systems like accuracy rates and security issues.
This document compares optical and magnetic rotary encoders, discussing their advantages and disadvantages. Optical encoders are more precise but have fragile internal mechanics that can fail in harsh environments due to vibration, moisture, or shaft misalignment. Magnetic encoders have fewer moving parts and are more durable, but earlier versions lacked precision. The document focuses on a magnetic encoder from Joral that is fully encapsulated, has no seals or bearings, and senses rotation non-contact through magnetic coupling, making it resistant to various environmental threats and misalignment issues.
Automation of wheel chair using ultrasonics and kinematics03meridaelinor
This document summarizes a paper presented at the NCCI 2010 conference on computational instrumentation in Chandigarh, India. The paper describes preliminary work developing an automated wheelchair controlled through eyeball and shoulder movements. Sensors detect eyeball position and direction through infrared light reflection. A capacitive sensor on the shoulder detects movement. Signals from these sensors direct the wheelchair's movement and an ultrasonic sensor detects obstacles. Testing on normal and hemiplegic patients found the sensors reliably detected eye and shoulder movements to control wheelchair direction. The system aims to help paralyzed people move independently through environments.
The document describes the APR9600 single-chip voice recording and playback integrated circuit from APLUS Integrated Circuits. Key features include 60 seconds of recording time, non-volatile flash memory, random and sequential access of multiple messages, and low power consumption. It provides detailed descriptions of the device's functionality in random access mode and tape mode, including recording and playback procedures in each mode. Block diagrams and pin descriptions are also included to explain the device's internal architecture and interface.
Electronic Hand Glove for Speed Impaired and Paralyzed PatientsIEEEP Karachi
This document describes an electronic hand glove designed to help people with speech impairments or paralysis communicate through gestures. It contains flex sensors that detect finger movements and a microcontroller that interprets the gestures using a lookup table to display letters on an LCD screen. The flex sensors are an economical and robust option that converts finger bends into electrical resistance. The glove allows people with signing abilities to communicate without others understanding sign language. It has applications for home devices, security, industries, biomedicine, and virtual reality. The gesture-based control provides an alternative to keyboards/mice and does not require the user or others to understand sign language.
The document describes a smart guide stick designed for blind people using ultrasonic sensors and an Arduino nano microcontroller. The stick detects nearby obstacles using ultrasonic sensors and notifies the user through a buzzer or vibration motor depending on the distance to the obstacle. This allows blind users to safely detect and navigate around obstacles. It can also help users locate the stick if it is misplaced using an RF module. The device aims to help blind people overcome common navigation challenges with a conventional walking stick.
This document describes an ultrasonic spectacles and waist-belt system for visually impaired and blind people. The system uses ultrasonic sensors to detect obstacles in front, left, and right directions up to 500cm away. It calculates the distance to detected objects and provides navigation guidance via prerecorded speech messages to help the user avoid obstacles. The system is controlled by a microcontroller that processes real-time sensor data and triggers the appropriate audio messages.
The document discusses biometric identification techniques including fingerprint, facial, and iris recognition. It covers the types of biometric systems used for applications like criminal justice, civil identification, and access control. The document also examines different fingerprint sensing and matching technologies as well as factors to consider for biometric systems like accuracy rates and security issues.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document is a project report on an "Intrusion Alert System" that was submitted by Arpit Sharma to partially fulfill the requirements for a Bachelor of Technology degree. The report includes sections on the circuit design, implementation, and conclusion for a system that uses a transmitter-receiver pair to detect unauthorized entry and indicate the location on a single bit display.
This document provides a summary of approaches to obstacle detection in images. It discusses 6 different techniques: 1) Using 3D grids and 2D grids with stereo vision, 2) A sequence of filters including ground/non-ground segmentation, background subtraction, size and appearance/shape filters, 3) An algorithm using disparity images, 4) Haar-like features with a cascade classifier, 5) Fast human detection using depth images, and 6) Using "equivalent points". Each technique is analyzed in 1-2 paragraphs with figures to illustrate key aspects.
This paper depicts ultrasonic visually impaired strolling stay with the utilization of arduino. As indicated by WHO, Visually weakened can go from gentle extreme. Around the world, between 300 million individuals are outwardly impeded because of different causes. Roughly 50 million People are thoroughly Blind Approximately 80 of visual deficiency happens in individuals over 50years old enough. In the event that u notice them, you can think about it they cant stroll without the assistance of other. For Blind People with no Support Its Difficult to arrive at their Destination. They faces numerous issues in their day by day schedule everyday life. Vision misfortune was connected by methods for self destructive considerations of self destruction endeavors, in another investigation from south Korea. Individuals with visual Impairment regularly endure significant psychosocial results, the creators wrote in the British Journal Of Ophthalmology. Ophthalmology is a part of medication and medical procedure which manages the determination and therapy of eye issues. ShobhanaSonwane | PriyankaGaidhane | Diksha Mohane | Nikita Gajbhiye | Akansha Patil | Tasneem Hasan "Smart Blind Stick using Arduino" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33411.pdf Paper Url: https://www.ijtsrd.com/engineering/computer-engineering/33411/smart-blind-stick-using-arduino/shobhanasonwane
This document is a project report for an IR obstacle detector integrated with a vacuum cleaner robot. It includes sections on the construction of the hardware and software units, describing the basic parts of the project including sensors, microcontroller, driver, motors and blower. It discusses problems faced in the making of the project, testing procedures, applications and future improvements. The report is submitted in partial fulfillment of requirements for a bachelor's degree in electronics and communication engineering.
Human Computer Interface Glove for Sign Language TranslationPARNIKA GUPTA
A human computer interface glove was developed with the aim of translating sign language to text & speech. The glove utilizes five flex sensors and an inertial measurement unit to accurately capture hand gestures. All components were placed on the backside of the glove providing the user with full range of motion, and not restricting the user from performing other tasks while wearing the glove.
This document summarizes a project that aims to enable communication between deaf or mute individuals and those without disabilities. The system uses flex sensors and an IMU placed in a glove to recognize sign language gestures. The gestures are converted to text and speech by a microcontroller interfaced with a speech synthesis chip. Voice inputs are converted to corresponding sign symbols using a speech recognition module. The flex sensors measure finger bending to determine gestures while the IMU provides data on hand position and movement. Programming is done using MPLAB and a C compiler to control the hardware and enable two-way translation between sign language and speech.
The document describes a wireless hand gesture system called GestureNail that is installed on artificial fingernails. It uses an LED and coil powered by radio frequency to notify the user when their finger is within the gesture detection area. A study found the notification increased task success rate from 85% to 100% and reduced task time by 0.7 seconds. The system could enable contactless control of devices like home electronics, public interfaces, or adding click gestures to tablets.
This document describes a fingerprint-based ATM and locker system for modern secured banks. The system uses fingerprint biometrics for authentication. It includes a fingerprint scanner, microcontroller, LCD display, buzzer, keypad, EEPROM, and connections to an ATM and locker. The fingerprint is scanned and matched to stored templates to authenticate users for bank transactions or locker access. The system is intended to provide secure authentication as fingerprints cannot be forgotten, stolen, copied or used by others like cards or passwords.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Appliance switching using eye movement for paralyzed peopleiaemedu
This document describes an eye movement-based assistive technology system for paralyzed individuals. The system allows users to control appliances via left and right eye movements detected by light dependent resistors. When the eye moves left, the resistance of the left LDR changes relative to the right LDR, and vice versa for right eye movements. This analog signal is converted to digital data by a microcontroller. The digital data is transmitted using an RF module to a receiver connected to appliances. The system aims to provide independence to fully paralyzed individuals in an affordable and portable manner compared to existing solutions.
Blind Stick Using Ultrasonic Sensor with Voice announcement and GPS trackingvivatechijri
for blind individuals. Basically, the ultrasonic detector is enforced within the walking stick for detection the obstacles ahead of the blind/impaired persons. If there are any obstacles, it'll alert the blind man to avoid that obstacles and therefore the alert in Our project proposes a low-priced walking stick supported latest technology and a brand-new implementation are created for economical interface the shape of voice announcement and buzzer to form a lot of helpful the stick is additionally mounted with the water detector that detects and alerts the blind if any wetness content is present to avoid slippery methods. Daily in several aspects so as to produce versatile and safe movement for the individuals. During this technology driven world, wherever individuals try to measure severally, this project propose a low-priced stick for blind individuals to achieve personal independence, in order that they will move from one place to a different simply and safely. A conveyable stick is style and developed that detects the obstacles within the path of the blind using sensors. The buzzer and vibration motor are activated once any obstacle is detected. Additionally, the stick is provided with GPS and SMS message system. GPS system give the knowledge relating to the situation of the blind man using the stick with his relations. SMS system is employed by the blind to send SMS message to the saved numbers within the microcontroller just in case of emergency.
Microcontroller Based Obstacle Detection Device Using Voice Signal for the V...IJMER
This paper aims in helping the visually impaired people through an electronic aid, which
senses any obstacle in the path and alarms the user of the obstacle. The device uses a simple principle of
transmitting an ultrasonic signal in the path generated by a wave generator. The signal gets reflected by
the obstacle (if any) in the path. The reflected signal is sensed by a sensor and produces a sound signal in
the form of voice. This voice signal directs the visually impaired person to identify the obstacles in front
of them
1. The document describes a human-machine interface system that uses electrooculography (EOG) signals measured from eye movements to control assistive devices. Electrodes placed around the eyes measure the small voltage changes corresponding to eye movements.
2. The EOG signals are amplified, filtered, and digitized before being fed into a microcontroller. Pattern recognition algorithms in the microcontroller are used to classify the eye movement and control eight different assistive devices.
3. The system provides an effective and low-cost means for individuals with disabilities to control devices through natural eye movements. Evaluation results demonstrated the system's ability to accurately detect different eye positions and directions of movement.
This document describes a proposed system called EyeMate for Blind and BlindTracker that aims to help blind individuals navigate and provide emergency tracking. The system uses sensors and an Android application to detect obstacles and alert the blind person via voice commands. It also tracks the person's location using GPS and stores it on a cloud server. Another application allows contacts to view the person's location to assist in emergencies. The goal is to allow blind individuals to navigate independently and seek help easily if needed.
Glasses for the blind using ping ultrasonic, ATMEGA8535 and ISD25120TELKOMNIKA JOURNAL
This document describes the development of smart glasses to assist blind people. The glasses use ultrasonic sensors, a microcontroller, and an audio recording chip. Three ultrasonic sensors are mounted on the glasses to detect obstacles in front, left, and right. The sensors output to a microcontroller which determines the obstacle locations. Based on the input, the microcontroller plays one of eight prerecorded audio messages through a speaker to inform the user of the obstacles. The device was tested by placing obstacles at different distances and angles from the sensors. It accurately identified the obstacle positions and played the corresponding audio messages to assist blind users with navigation.
The document describes a gesture controlled robot that can be operated wirelessly through hand gestures detected by sensors in a glove. The robot uses an accelerometer and wireless transmission modules to receive gesture commands from the glove and control motors to move in the corresponding directions. It aims to allow intuitive control of the robot without remote controls. The methodology discusses the wireless transmission between the glove and robot, including radio frequency transmission and reception modules, and a microcontroller that interprets the commands and controls motors through an motor driver circuit. The scope outlines several potential applications of gesture controlled robots, such as for disabled users, industrial tasks, and entertainment.
GPS & GSM based Voice Alert System for Blind Personijsrd.com
This paper presents a theoretical model and a system concept to provide a smart electronic aid for blind people. This system is intended to provide overall measures –object detection and real time assistance via Global Positioning System (GPS).The system consist of ultrasonic sensor, GPS Module, GSM Module and vibratory circuit (speakers or head phones). This project aims at the development of an Electronic Travelling Aid (ETA) kit to help the blind people to find obstacle free path. This ETA is fixed to the stick of the blind people. When the object is detected near to the blinds stick it alerts them with the help of vibratory circuit (speakers or head phones). The location of the blind is found using Global System for Mobile communications (GSM) and Global Position System (GPS).
This document outlines a B.Sc. project to develop a smart blind stick system to help blind people navigate and interact with their environment. It will include several subsystems:
1) An ultrasound sensor and vibration motor system to detect obstacles and alert the user.
2) An indoor and outdoor navigation system using GPS and voice commands to guide the user between locations.
3) A wireless control system for appliances and security system activated by voice commands.
The project will be carried out by a team of students at Mansoura University, supervised by Assistant Professor Mohamed Abdel-Azim. It will involve research into relevant technologies like speech recognition, image processing, GPS, ultrasound, and microcontrollers. The
This document summarizes a student project to create a digital navigation system for blind people as an alternative to a walking cane. The system uses an ultrasonic sensor and microcontroller to detect obstacles and a vibrating motor to provide distance feedback to the user. Initial testing showed the prototype could accurately measure distances and differentiate between distance intervals. However, users had difficulty distinguishing the intensity of vibrations corresponding to different distances. Further development is needed to improve the feedback mechanism so blind users can safely navigate independently.
Biometric Hashing technique for AuthenticationAnIsh Kumar
This document summarizes a student project on bio-hashing authentication techniques. It includes an outline of topics to be covered such as types of cryptography, image encryption methods, cellular automata techniques like Langton's ant, and algorithms like Blowfish. The project is mentored by Dr. Debasis Giri and includes four students - Ankit Agarwal, Tuhin Kundu, Bachu Paul, and Anish Kumar. It aims to introduce bio-hashing authentication, discuss related work, and propose improvements such as generating a visually meaningful encrypted image.
An ATM program begins by setting the initial balance to $1000. It then displays a menu asking the user to select an option to print their balance or withdraw funds. Based on their selection, it will either print the current balance or withdraw the amount and print the updated balance.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document is a project report on an "Intrusion Alert System" that was submitted by Arpit Sharma to partially fulfill the requirements for a Bachelor of Technology degree. The report includes sections on the circuit design, implementation, and conclusion for a system that uses a transmitter-receiver pair to detect unauthorized entry and indicate the location on a single bit display.
This document provides a summary of approaches to obstacle detection in images. It discusses 6 different techniques: 1) Using 3D grids and 2D grids with stereo vision, 2) A sequence of filters including ground/non-ground segmentation, background subtraction, size and appearance/shape filters, 3) An algorithm using disparity images, 4) Haar-like features with a cascade classifier, 5) Fast human detection using depth images, and 6) Using "equivalent points". Each technique is analyzed in 1-2 paragraphs with figures to illustrate key aspects.
This paper depicts ultrasonic visually impaired strolling stay with the utilization of arduino. As indicated by WHO, Visually weakened can go from gentle extreme. Around the world, between 300 million individuals are outwardly impeded because of different causes. Roughly 50 million People are thoroughly Blind Approximately 80 of visual deficiency happens in individuals over 50years old enough. In the event that u notice them, you can think about it they cant stroll without the assistance of other. For Blind People with no Support Its Difficult to arrive at their Destination. They faces numerous issues in their day by day schedule everyday life. Vision misfortune was connected by methods for self destructive considerations of self destruction endeavors, in another investigation from south Korea. Individuals with visual Impairment regularly endure significant psychosocial results, the creators wrote in the British Journal Of Ophthalmology. Ophthalmology is a part of medication and medical procedure which manages the determination and therapy of eye issues. ShobhanaSonwane | PriyankaGaidhane | Diksha Mohane | Nikita Gajbhiye | Akansha Patil | Tasneem Hasan "Smart Blind Stick using Arduino" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33411.pdf Paper Url: https://www.ijtsrd.com/engineering/computer-engineering/33411/smart-blind-stick-using-arduino/shobhanasonwane
This document is a project report for an IR obstacle detector integrated with a vacuum cleaner robot. It includes sections on the construction of the hardware and software units, describing the basic parts of the project including sensors, microcontroller, driver, motors and blower. It discusses problems faced in the making of the project, testing procedures, applications and future improvements. The report is submitted in partial fulfillment of requirements for a bachelor's degree in electronics and communication engineering.
Human Computer Interface Glove for Sign Language TranslationPARNIKA GUPTA
A human computer interface glove was developed with the aim of translating sign language to text & speech. The glove utilizes five flex sensors and an inertial measurement unit to accurately capture hand gestures. All components were placed on the backside of the glove providing the user with full range of motion, and not restricting the user from performing other tasks while wearing the glove.
This document summarizes a project that aims to enable communication between deaf or mute individuals and those without disabilities. The system uses flex sensors and an IMU placed in a glove to recognize sign language gestures. The gestures are converted to text and speech by a microcontroller interfaced with a speech synthesis chip. Voice inputs are converted to corresponding sign symbols using a speech recognition module. The flex sensors measure finger bending to determine gestures while the IMU provides data on hand position and movement. Programming is done using MPLAB and a C compiler to control the hardware and enable two-way translation between sign language and speech.
The document describes a wireless hand gesture system called GestureNail that is installed on artificial fingernails. It uses an LED and coil powered by radio frequency to notify the user when their finger is within the gesture detection area. A study found the notification increased task success rate from 85% to 100% and reduced task time by 0.7 seconds. The system could enable contactless control of devices like home electronics, public interfaces, or adding click gestures to tablets.
This document describes a fingerprint-based ATM and locker system for modern secured banks. The system uses fingerprint biometrics for authentication. It includes a fingerprint scanner, microcontroller, LCD display, buzzer, keypad, EEPROM, and connections to an ATM and locker. The fingerprint is scanned and matched to stored templates to authenticate users for bank transactions or locker access. The system is intended to provide secure authentication as fingerprints cannot be forgotten, stolen, copied or used by others like cards or passwords.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Appliance switching using eye movement for paralyzed peopleiaemedu
This document describes an eye movement-based assistive technology system for paralyzed individuals. The system allows users to control appliances via left and right eye movements detected by light dependent resistors. When the eye moves left, the resistance of the left LDR changes relative to the right LDR, and vice versa for right eye movements. This analog signal is converted to digital data by a microcontroller. The digital data is transmitted using an RF module to a receiver connected to appliances. The system aims to provide independence to fully paralyzed individuals in an affordable and portable manner compared to existing solutions.
Blind Stick Using Ultrasonic Sensor with Voice announcement and GPS trackingvivatechijri
for blind individuals. Basically, the ultrasonic detector is enforced within the walking stick for detection the obstacles ahead of the blind/impaired persons. If there are any obstacles, it'll alert the blind man to avoid that obstacles and therefore the alert in Our project proposes a low-priced walking stick supported latest technology and a brand-new implementation are created for economical interface the shape of voice announcement and buzzer to form a lot of helpful the stick is additionally mounted with the water detector that detects and alerts the blind if any wetness content is present to avoid slippery methods. Daily in several aspects so as to produce versatile and safe movement for the individuals. During this technology driven world, wherever individuals try to measure severally, this project propose a low-priced stick for blind individuals to achieve personal independence, in order that they will move from one place to a different simply and safely. A conveyable stick is style and developed that detects the obstacles within the path of the blind using sensors. The buzzer and vibration motor are activated once any obstacle is detected. Additionally, the stick is provided with GPS and SMS message system. GPS system give the knowledge relating to the situation of the blind man using the stick with his relations. SMS system is employed by the blind to send SMS message to the saved numbers within the microcontroller just in case of emergency.
Microcontroller Based Obstacle Detection Device Using Voice Signal for the V...IJMER
This paper aims in helping the visually impaired people through an electronic aid, which
senses any obstacle in the path and alarms the user of the obstacle. The device uses a simple principle of
transmitting an ultrasonic signal in the path generated by a wave generator. The signal gets reflected by
the obstacle (if any) in the path. The reflected signal is sensed by a sensor and produces a sound signal in
the form of voice. This voice signal directs the visually impaired person to identify the obstacles in front
of them
1. The document describes a human-machine interface system that uses electrooculography (EOG) signals measured from eye movements to control assistive devices. Electrodes placed around the eyes measure the small voltage changes corresponding to eye movements.
2. The EOG signals are amplified, filtered, and digitized before being fed into a microcontroller. Pattern recognition algorithms in the microcontroller are used to classify the eye movement and control eight different assistive devices.
3. The system provides an effective and low-cost means for individuals with disabilities to control devices through natural eye movements. Evaluation results demonstrated the system's ability to accurately detect different eye positions and directions of movement.
This document describes a proposed system called EyeMate for Blind and BlindTracker that aims to help blind individuals navigate and provide emergency tracking. The system uses sensors and an Android application to detect obstacles and alert the blind person via voice commands. It also tracks the person's location using GPS and stores it on a cloud server. Another application allows contacts to view the person's location to assist in emergencies. The goal is to allow blind individuals to navigate independently and seek help easily if needed.
Glasses for the blind using ping ultrasonic, ATMEGA8535 and ISD25120TELKOMNIKA JOURNAL
This document describes the development of smart glasses to assist blind people. The glasses use ultrasonic sensors, a microcontroller, and an audio recording chip. Three ultrasonic sensors are mounted on the glasses to detect obstacles in front, left, and right. The sensors output to a microcontroller which determines the obstacle locations. Based on the input, the microcontroller plays one of eight prerecorded audio messages through a speaker to inform the user of the obstacles. The device was tested by placing obstacles at different distances and angles from the sensors. It accurately identified the obstacle positions and played the corresponding audio messages to assist blind users with navigation.
The document describes a gesture controlled robot that can be operated wirelessly through hand gestures detected by sensors in a glove. The robot uses an accelerometer and wireless transmission modules to receive gesture commands from the glove and control motors to move in the corresponding directions. It aims to allow intuitive control of the robot without remote controls. The methodology discusses the wireless transmission between the glove and robot, including radio frequency transmission and reception modules, and a microcontroller that interprets the commands and controls motors through an motor driver circuit. The scope outlines several potential applications of gesture controlled robots, such as for disabled users, industrial tasks, and entertainment.
GPS & GSM based Voice Alert System for Blind Personijsrd.com
This paper presents a theoretical model and a system concept to provide a smart electronic aid for blind people. This system is intended to provide overall measures –object detection and real time assistance via Global Positioning System (GPS).The system consist of ultrasonic sensor, GPS Module, GSM Module and vibratory circuit (speakers or head phones). This project aims at the development of an Electronic Travelling Aid (ETA) kit to help the blind people to find obstacle free path. This ETA is fixed to the stick of the blind people. When the object is detected near to the blinds stick it alerts them with the help of vibratory circuit (speakers or head phones). The location of the blind is found using Global System for Mobile communications (GSM) and Global Position System (GPS).
This document outlines a B.Sc. project to develop a smart blind stick system to help blind people navigate and interact with their environment. It will include several subsystems:
1) An ultrasound sensor and vibration motor system to detect obstacles and alert the user.
2) An indoor and outdoor navigation system using GPS and voice commands to guide the user between locations.
3) A wireless control system for appliances and security system activated by voice commands.
The project will be carried out by a team of students at Mansoura University, supervised by Assistant Professor Mohamed Abdel-Azim. It will involve research into relevant technologies like speech recognition, image processing, GPS, ultrasound, and microcontrollers. The
This document summarizes a student project to create a digital navigation system for blind people as an alternative to a walking cane. The system uses an ultrasonic sensor and microcontroller to detect obstacles and a vibrating motor to provide distance feedback to the user. Initial testing showed the prototype could accurately measure distances and differentiate between distance intervals. However, users had difficulty distinguishing the intensity of vibrations corresponding to different distances. Further development is needed to improve the feedback mechanism so blind users can safely navigate independently.
Biometric Hashing technique for AuthenticationAnIsh Kumar
This document summarizes a student project on bio-hashing authentication techniques. It includes an outline of topics to be covered such as types of cryptography, image encryption methods, cellular automata techniques like Langton's ant, and algorithms like Blowfish. The project is mentored by Dr. Debasis Giri and includes four students - Ankit Agarwal, Tuhin Kundu, Bachu Paul, and Anish Kumar. It aims to introduce bio-hashing authentication, discuss related work, and propose improvements such as generating a visually meaningful encrypted image.
An ATM program begins by setting the initial balance to $1000. It then displays a menu asking the user to select an option to print their balance or withdraw funds. Based on their selection, it will either print the current balance or withdraw the amount and print the updated balance.
This document contains a list of 200 embedded system projects from various domains like general embedded systems, gesture based systems, vehicular technology, ARM controller based, CAN bus based, Android based, and greenhouse monitoring systems. Each project is assigned a unique identification code and title. The document also provides contact information for Hades InfoTech, the organization providing these project options.
This document provides an overview of biometric authentication techniques. It discusses what biometric authentication is, the different types of biometric techniques including fingerprint, face, iris, hand geometry, and voice recognition. It covers how biometric systems work, performance metrics, applications, limitations, and concludes that biometric authentication provides strong security for applications like e-commerce and e-government by utilizing unique physical and behavioral human traits.
This document presents a mini project on designing an automated teller machine (ATM) controller. The objectives are to review literature on ATM controllers, design the architecture specifications, develop a Verilog model, and verify functionality through behavioral simulation and FPGA synthesis. Key components of the ATM controller include a card swiper, keypad, display, memory modules, and a state machine controlled transaction verification process. The controller will be modeled in Verilog and simulated using Modelsim, with the intended functionality verified through test cases.
Fingerprint recognition is a biometric technique that uses fingerprint patterns to identify or verify individuals. It works by extracting minutiae points like ridge endings and bifurcations from scanned fingerprints and matching them against a database. The process involves fingerprint acquisition using optical or semiconductor sensors, minutiae extraction after preprocessing and thinning the image, and minutiae matching for verification or identification. Fingerprint recognition has applications in security systems and has advantages of high accuracy and small storage requirements, though it can be affected by dirty or wounded fingers.
An ATM allows customers to access financial services without a human bank teller. It uses a card with unique account information and a PIN for security. An ATM has components like a card reader, keypad, screen and cash dispenser to withdraw and deposit money, check balances, transfer funds and more. The first ATM was installed in 1967 in London. Now ATMs are widely used, come in various types, and occasionally experience fraud, but precautions can help users stay safe.
This document summarizes a student project on fingerprint recognition. The project involved implementing a fingerprint recognition algorithm using minutia extraction and matching. The algorithm included preprocessing stages like histogram equalization, Fourier enhancement, binarization, and thinning. Minutiae were then extracted and matched to determine if two fingerprints came from the same finger. The results showed the algorithm could accurately match fingerprints from the same finger but determine fingerprints from different fingers did not match.
Fingerprints have been used for identification since 1882. There are three main fingerprint patterns: loops, whorls, and arches. Loops make up 65% of fingerprints, whorls 30%, and arches 5%. Fingerprints are identified by features called minutiae including bifurcations, endings, and cores. There are two main techniques for fingerprint matching: minutiae-based which matches placement of minutiae points, and correlation-based which can overcome difficulties of minutiae-based matching. Fingerprints are captured using either optical or capacitive sensors and processed using image algorithms. Fingerprint identification has advantages of high accuracy, economy, and standardization but disadvantages of potential intrusiveness and errors from dirty or
This document describes a sign language to voice conversion glove project. The project aims to help facilitate communication between deaf/mute communities and others by translating sign language gestures into speech. The glove uses flex sensors along the fingers connected to a microcontroller that analyzes the gestures and triggers a voice processing chip to output the corresponding word or phrase. The system is powered by a voltage regulator and includes an LCD for feedback. It provides a low-cost and portable way to bridge the communication gap experience by those in the deaf/mute community.
This document describes a major project on a biometric fingerprint attendance system. It discusses biometrics and how fingerprints can be used for identification. The system uses a microcontroller, LCD, fingerprint scanner, EEPROM, and other components. Fingerprints are unique based on ridge and valley patterns. The system scans fingerprints and compares them to stored templates to verify identities for attendance tracking.
IRJET - Smart Washroom Cleaning System using Hub Technology IRJET Journal
This document describes a smart washroom cleaning system that uses hub technology to maintain cleanliness and hygiene in public toilets. The system uses various sensors like an odor sensor, ultrasonic sensor, RFID module, and GSM module connected to a microcontroller to automatically detect users, monitor odor levels, and trigger cleaning activities like flushing and activating air fresheners. It is designed to help achieve the cleanliness goals of India's Swachh Bharat Abhiyan initiative. The system would send status updates to authorities via GSM and allow remote cleaning requests to help keep public toilets clean.
Microcontrollers are small computer chips that are used to control intelligent systems. They are found in devices like TVs, washing machines, games, phones, cars, planes, and more. Microcontrollers measure and control their environment by sensing inputs and outputting signals to control various functions. Unlike microprocessors, microcontrollers incorporate features like memory and input/output ports that allow them to directly control their environment. The 8051 microcontroller is one of the most popular and was introduced in the 1980s. It has memory and timers/counters that allow it to run automated programs and track time for applications like turning a light on and off every 30 seconds.
Handicapped Assistance Device for Controlling Electrical Appliances Jamuna R - Assistant Professor,
Abhinai S - UG scholar,
Jhananadhan SP - UG scholar,
Department of ECE,
SNS College of Engineering, Coimbatore, India
Report on Embedded Based Home security systemNIT srinagar
This document describes an embedded home security system that uses various sensors and components. The system uses an AT89S52 microcontroller along with an IR sensor, LCD display, GSM module, LEDs and other components. The IR sensor detects intruders and the GSM module sends alerts. It provides automated security monitoring and user authentication to prevent break-ins. The system is designed to be effective, practical and reasonably priced for home security.
The document describes a people counting system using infrared sensors and a microcontroller. The system uses IR LED and phototransistor pairs placed at the entrance and exit to detect movement in or out. The microcontroller increments or decrements the count displayed on a 7-segment display depending on signals from the IR sensors indicating entry or exit. The system allows monitoring visitor traffic for applications like seminar halls or museums to prevent overcrowding.
This document presents a smart door system that uses a passive infrared (PIR) sensor to automatically open and close doors based on detecting nearby movement. The system includes an ATmega328 microcontroller, PIR sensor, relay driver IC, voltage regulator, LCD display, and other components. When the PIR sensor detects a person within its range, it sends a signal to the microcontroller to open the door. The door then automatically closes after a set time delay if no further movement is detected. The smart door system aims to provide convenience for disabled individuals and reduce contact with doors in places like hospitals.
The document discusses fingerprint-based authentication for embedded systems security. It begins with an introduction describing how embedded systems are increasingly networked and vulnerable. It then discusses fingerprint identification and authentication techniques. The rest of the document describes the hardware and software requirements for a fingerprint authentication system, including a microcontroller, fingerprint module, LCD, power supply, and other components. Block diagrams and working principles are provided to explain how the system functions to authenticate users via fingerprint and control access.
This document provides a 3-part summary of the process for manufacturing a smart card:
1) It describes the key stages in manufacturing a smart card, from specifying the chip, card, and software to fabricating the chip and embedding it in the card.
2) It then discusses the chip specification process and considerations like the microcontroller, memory sizes, electrical parameters, and security requirements.
3) Finally, it covers the mask ROM and application software specifications, and the chip fabrication process which involves attaching the chip to a substrate and sealing it before embedding in the plastic card.
The document describes an eye blink monitoring system to prevent accidents due to driver drowsiness. The system uses an infrared sensor to continuously monitor the driver's eye blink rate. If abnormal blinking is detected, such as during drowsiness, an alarm will sound to alert the driver. The system aims to make driving safer by warning drivers before they fall asleep at the wheel.
This document describes a fingerprint-based security system project. The system uses a fingerprint sensor and microcontroller to scan fingerprints and compare them to registered fingerprints to grant access. It has two modes - master mode to add and delete users, and user mode to authenticate employees. If the scanned fingerprint matches a registered print, the microcontroller sends the user ID to the computer and activates devices like unlocking a door. The system aims to provide secure access control for organizations using biometric fingerprint identification.
The document discusses the development of a gesture-controlled robot. It describes how the robot works using an accelerometer to detect hand gestures, an encoder and transmitter to wirelessly send the gesture data, a receiver and decoder to interpret the data, and a microcontroller and motor driver to control motors based on the gestures. The robot is intended to help disabled people control devices with gestures instead of physical inputs. The system aims to provide a simple and affordable design for potential wide applications.
Wheelchair Control Using Voice Recognition R. Jamuna - Assistant Professor,
K. Bharath Kumar - UG Scholar,
P. Karthikeyan - UG Scholar,
Department Of ECE,
SNS College of Engineering, Coimbatore, India
IRJET- Smart Blind Stick for Visually Impaired PeopleIRJET Journal
This document describes a smart blind stick that uses various sensors to help visually impaired people navigate safely. The stick contains an ATmega8 microcontroller, ultrasonic sensors to detect obstacles, a moisture sensor to detect water, and a PIR sensor to detect humans. When obstacles are near, the microcontroller sends a signal to a Bluetooth module connected to a smartphone via an Android app. This allows the system to provide navigation assistance and help avoid dangers using sensors. The goal is to enable the visually impaired to move with greater ease, confidence and independence than with a traditional white cane.
ENERGY HARVESTING METHOD IN WIRELESS SENSOR NETWORKijejournal
With the advent of modern micro mechanical system technology and wireless communication wireless
sensor networks are finding a lot of application in modern day life. The design of the sensor network
depends on the specific application. This paper gives a description of the components of the wireless
sensor nodes used. It also describes how the lifetime of a wireless sensor network can be increased by the
use of energy harvesting sensor nodes.
Floor cleaning robot(autonomus mannual) vatsal shah-ec_4th yearVatsal N Shah
This document describes the design of an autonomous robotic vacuum cleaner that can also be controlled manually via a mobile phone application. The robotic vacuum uses various sensors like ultrasonic sensors, IR sensors and a light dependent resistor to navigate environments and avoid obstacles. An Arduino Mega microcontroller processes input from the sensors to determine the vacuum's movements. The vacuum can operate fully autonomously or be controlled manually via Bluetooth using a mobile phone app. A prototype was created and tested that demonstrated the robotic vacuum's ability to navigate and respond to obstacles in both autonomous and manual modes.
Design Efficient Wireless Monitoring Platform for Recycling Point SpotsIJMTST Journal
There is a growing demand for low cost, very low power and reduced size monitoring systems with
wireless communications, to be used in different kinds of industrial environments. In several countries waste
separation and recycling is a major issue. Consequently, the number of recycling spots has been steadily
increasing. In order to ensure that recycle bins are properly maintained, several monitoring solutions have
been proposed. These still have several limitations, such as requiring wires for power and/or communications
and not being able to fit in all existing types of bins. This paper presents WECO, a wireless embedded solution
for monitoring the level of the bins located in recycling spots. The proposed system automatically alerts a
remote central station when a bin reaches a programmable filling level, thus avoiding the need to spot check
if the bin is full and ensuring that the recycling spot is kept clean. The developed prototype required
hardware-software co-design and aimed to meet the above mentioned requirements, resorting to the IEEE
802.15.4 protocol for wireless communications between all nodes in the network, each based on a
System-On-Chip CC2530 from Texas Instruments. Due to its wireless nature, the architecture requires a
battery for power supplying the nodes, with a life time of at least six years. The filling level readings of each
bin in a recycling spot are made using an ultrasonic sensor. The data collected by the monitoring platform is
then sent to the remote central station that processes it in order to optimize routes and establish a scheduled
collection of the recycling spots.
FINGERPRINT BASED ATM SYSTEM...............DeepakK547422
This document describes a fingerprint-based ATM system that uses fingerprint scanning as authentication for transactions. The system stores users' fingerprint data in an Aadhaar database. During transactions, the user's fingerprint is scanned and matched against the stored data. If a match is found, the transaction is completed. Otherwise, the transaction is cancelled for security. The document outlines the proposed system design, including modules for fingerprint scanning, iris detection, database storage, and transaction authorization based on biometric authentication. It concludes that the fingerprint-based system allows for secure and easy-to-use ATM transactions.
Home Appliances Controlling using Android Mobile via BluetoothMOKTARI MOSTOFA
This project allows control of electrical appliances using an Android device. An Android application is installed to send commands via Bluetooth to a microcontroller. The microcontroller then controls relays connected to appliances like lights and fans, allowing remote switching on/off. This provides assistance for elderly and disabled people by making appliances controllable from a smartphone.
Home Appliances Controlling using Android Mobile via Bluetooth
biometrics
1. AUTOMOBILE ENGG. DEPARTMENT Page 1
CHAPTER-1
INTRODUCTION
1.0. Background:
There are many classical ways to identify a person’s authentication such as password, identity card,etc. but
nowadays, the popular approach is Biometric which is used to authenticate a person. In this approach,we use
different identification approaches such as face recognition, voice recognition, fingerprint recognition and
retina recognition etc. So that, there is no need to carry an Identity card or too remembers password . The
most important thing is that it cannot be shared or misplaced. This approach can be used in the field of unive
rsality, acceptability, performance etc (Takita et al.,2003).The technique used in biometric system has been
broadly classified into two major areas namely behavioural and psychological biometric.
Behavioural biometric has certain parameters such as signature, speech etc.but these parameters change with
time and environment.Whereas the physiological characteristics such as palm print, face recognition, and fin
-gerprint remain unchanged throughout the individual life span. This concept is focused around the study an
implementation of a fingerprint recognition system. Fingerprint is one of the most popular biometric method
used to verify and identify a person. Formally it is defined as “The pattern of ridges and furrows on an indiv
-idual finger”. Ridges are the lines in thumb and furrow is to shallow trench of skin on an individual’s finger
.Furrow is also referred to as valley. The combination of ridges and furrows makes an individuals fingerprint
The combination of ridges and furrows that make the finger print of each person unique. The uniqueness of
a fingerprint is exclusively determined by the local ridge characteristics and their relationships (Kuglin et al.
,1975). The ridges and furrows present in the finger show good similarity in each small local windows.
Optical fingerprint imaging involves capturing a digital image of the print using visible light. This type of
sensor is, in essence, a specialized digital camera. The top layer of the sensor, where the finger is placed, is
known as the touch surface. Beneath this layer is a light-emitting phosphor layer which illuminates the surfa
-ce of the finger. The light reflected from the finger passes through the phosphor layer to an array of solidsta
-te pixels (a charge-coupled device) which captures a visual image of the fingerprint. A scratched or dirty to
uch surface can cause a bad image of the fingerprint. A disadvantage of this type of sensor is the fact that im
aging capabilities are affected by the quality of skin on the finger. For instance, a dirty or marked finger dif
ficult to image properly. Also, it is possible for an individual to erode the outer layer of skin on the fingert
ips to the point where the fingerprint is no longer visible. It can also be easily fooled by an image of afinger
print if not coupled with a "live finger" detector. However, unlike capacitive sensor, this sensor techn-ology
is not susceptible to electrostatic discharge damage.
2. AUTOMOBILE ENGG. DEPARTMENT Page 2
1.1. SPECIFICATION:
It consists of optic fingerprint sensor, high performance DSP processor and Flash. It boasts of functions such
as fingerprint Login, fingerprint deletion, fingerprint verification, fingerprint upload, fingerprint download,
etc. Compared to products of similar nature, SM630 enjoys the following unique features:
SM630 module algorithm is specially designed according to the image generation Theory of the opti-
c fingerprint collection device. It has excellent correction & tolerance to deformed and poor-quality
fingerprint.
User does not have to have professional know-how in fingerprint verification.
User can easily develop powerful fingerprint verification application systems
based on the rich collection of controlling command provided by SM630 module.
All the commands are simple, practical and easy for development.
Operating Voltage:
4.3V~6V
Rating Voltage:
6.5V(exceeding this value will cause permanent damage to the module)
Operating Current:
<80mA(Input voltage 5V)
Fingerprint Template:
768 templates
Search Time:
<1.5s(200 fingerprint, average value in test)
Power-on Time:
<200ms(Time lapse between module power-on to module ready to receive
instructions)
Tolerated Angle Offset:
±45°
User Flash Memory:
64KByte
Interface Protocol:
Standard serial interface (TTL level)
Communication Baud Rate:
57600bps
Operating Environment:
Temperature: -10℃~+40℃
Relative humidity: 40%RH~85%RH
3. AUTOMOBILE ENGG. DEPARTMENT Page 3
1.1.1. CIRCUIT:
The circuit is fabricated on a silicon board of a 75mm x 27mm dimension. As shown in the fig 1.1: 1.50 mm is left on side walls
to be able to attach it to the prototype body.
FIG 1.1. circuit dimensions
1.1.2 optical sensor :
The biometric glass is optical and is used to capture the image of the
finger features. As shown in the fig 1.2:the glass dimension is 19.50mm x 32.50mm.
FIG 1.2: OPTICAL FINGER SCANNER
4. AUTOMOBILE ENGG. DEPARTMENT Page 4
1.2 COMPONENTS:
1.2.1 STEP DOWN TRANSFORMER
As shown in the fig.1.3: Step down transformer is 220 volt Ac to 9-0-9 ac. We use step down transformer to
step down the voltage from 220 to 9 volt ac. This AC is further connected to the rectifier circuit for AC to
DC conversion. Transformer current rating is 750 ma .
FIG 1.3 TRANSFORMER
1.2.2 DIODE.
In this project we use IN 4007 diode as a rectifier. IN 4007 is special diode to convert the AC into DC In this
project we use two diode as a rectifier. Here we use full wave rectifier. Output of rectifier is pulsating DC.
To convert the pulsating dc into smooth dc we use Electrolytic capacitor as a main filter. From fig:1.4: it
converts AC to DC. Capacitor converts the pulsating dc into smooth dc and this DC is connected to the Regu
-lator circuit for Regulated 5 volt DC.
FIG 1.4: DIODE
5. AUTOMOBILE ENGG. DEPARTMENT Page 5
1.2.3 microcontroller unit
A microcontroller is a small computer (SoC) on a single integrated circuit containing a processor core, me
mory, and programmable input/output peripherals. Program memory in the form of Ferroelectric RAM, NoR
flash or OTP ROM is also often included on chip, as well as a typically small amount of RAM. Microcontro
llers are designed for embedded applications, in contrast to the microprocessors used in personal computer
s or other general purpose applications consisting of various discrete chips. From the fig 1.5: there is the con
version power from 220V to 9V through secondary circuit.
FIG 1.5: MICROCONTROLLER CIRCUIT
1.2.3 RESET CIRCUITRY
From the fig.1.6: Pin no 9 of the controller is connected to the reset circuit. On the circuit we connect one
resistor and capacitor circuit to provide a reset option when power is on.As soon as you give the power suppl
-y the 8051 doesn't start. You need to restart for the microcontroller to start. Restarting the microcontroller is
nothing but giving a Logic 1 to the reset pin at least for the 2 clock pulses. So it is good to go for a small cir
-cuit which can provide the 2 clock pulses as soon as the microcontroller is powered. This is not a big circuit
we are just using a capacitor to charge the microcontroller and again discharging via resistor.
FIG 1.6 RESET CIRCUITRY
6. AUTOMOBILE ENGG. DEPARTMENT Page 6
1.2.4 CRYSTALS
As shown in fig1.7: Pin is connected to external crystal oscillator to provide a clock to the circuit. Crystals
provide the synchronization of the internal function and to the peripherals. Whenever ever we are using cryst
als we need to put the capacitor behind it to make it free from noises. It is good to go for a 33pf capacitor.
As shown in fig:1.8 the circuit is grounded to avoid excess current.
FIG 1.7: CRYSTALS FIG 1.8: CRYSTALS CIRCUIT
We can also resonators instead of costly crystal which are low cost and external capacitor can be avoided.
But the frequency of the resonators varies a lot. And it is strictly not advised when used for communications
projects.
7. AUTOMOBILE ENGG. DEPARTMENT Page 7
1.3 PROGRAMMING A BLANK CHIP
1.3.1 The 8051
The 8051 developed and launched in the early 80`s, is one of the most popular micro controller in use today.
It has a reasonably large amount of built in ROM and RAM. In addition it has the ability to access external.
The generic term `8x51` is used to define the device. The value of x defining the kind of ROM, i.e. x=0, indi
cates none, x=3, indicates mask ROM, x=7, indicates EPROM and x=9 indicates EEPROM or Flash.
Different micro controllers in market.
PIC: One of the famous microcontrollers used in the industries. It is based on RISC Architecture
which makes the microcontroller process faster than other microcontroller.
INTEL:These are the first to manufacture microcontrollers. These are not as sophisticated other
microcontrollers but still the easiest one to learn.
ATMEL:Atmel's AVR microcontrollers are one of the most powerful in the embedded industry. This
is the only microcontroller having 1kb of ram even the entry stage. But it is unfortunate that in India
we are unable to find this kind of microcontroller.
1.3.2 INTEL 8051
Intel 8051 is CISC architecture which is easy to program in assembly language and also has a good support f
or High level languages.
The memory of the microcontroller can be extended up to 64k.
This microcontroller is one of the easiest microcontrollers to learn.
The 8051 microcontroller is in the field for more than 20 years. There are lots of books and study materials a
re readily available for 8051.
First of all we select and open the assembler and wrote a program code in the file. After wrote a software
we assemble the software by using internal assembler of the 8051 editor. If there is no error then assembl
er assemble the software abd 0 error is show the output window.
now assembler generate a ASM file and HEX file. This hex file is useful for us to program the blank chip.
Now we transfer the hex code into the blank chip with the help of serial programmer kit. In the programmer
we insert a blank chip 0f 89s51series.These chips are multi time programmable chip. This programming kit
is separately avilable in the market and we transfer the hex code into blank chip with the help of the serial
programmer kit.
9. AUTOMOBILE ENGG. DEPARTMENT Page 9
1.4 WORKING OF ICD SCREEN
A liquid-crystal display (LCD) is a flat-panel display or other electronic visual display that uses the light-mo
dulating properties of liquid crystals. Liquid crystals do not emit light directly.In a plasma screen, each pixel
is a tiny fluorescent lamp switched on or off electronically. In an LCD screen, the pixels are switched on or
off electronically using liquid crystals to rotate polarized light. Each pins have different potential charged to
it. As the message are very limited to be displayed, we can use a 2 x 16 LCD display unit.
fig 1.12: LCD SCREEN CKT.
10. AUTOMOBILE ENGG. DEPARTMENT Page 10
Description of various nodes of connections and its values :
PIN NO 1 VSS GROUND
PIN NO 2 VCC +5 V SUPPY.
PIN NO 3 VEE POWER SUPPLY TO CONTRAST CONTROL
PIN NO 4 RS RS = 0 TO SELECT
FIG 1.13: LCD SCREEN SPECIFICATIONS
from fig 1.13
Module is connected to HOST via 4PIN cable. The PIN definition is as follows:
No. PIN Definition Remarks
1 Power supply + Power supply +
2 Module Tx Open circuit output, need to use pull-up
impedance in application (Typical value:
10KΩ)
3 Module Rx Wide voltage input, 7V affordable
4 Power supply Power supply -
Notes:
The PIN close to the edge of circuit board is PIN4: Power supply -.
11. AUTOMOBILE ENGG. DEPARTMENT Page 11
1.5. CODING METHODS
The communication between HOST and Module must be coded as Communication
Packet.
One communication packet includes the following:
Packet Head(2 bytes)
Packet flag(1 byte)
Packet length(1 byte)
Packet Content(N bytes)
Check sum(1 byte)
Packet head:0x4D 0x58
Packet flag;
0x10:command packet
0x20:data packet
0x21:last packet
0x30:response packet
Packet length:
Length of the Content in packet
Packet content:
Content of packet
Check sum:
Low 8 bytes of the SUM from packet head to check sum.
1.5. BRIEF WORK FLOWCHART:
Module waits for command from HOST after it is powered on. Module will respond
by a Rx correct packet after receiving the correct command. Module will perform
operations according to the command and will return corresponding information after
the operation is successful. When the Module is performing operation, it will not
respond to other command given by HOST. If the check sum for the received
command is wrong, the module will send back receive error response.
Module receive correct packet:
0x4D + 0x58 + 0x30 + 0x01 + 0x01 + 0xD7
Module receive error packet:0x4D + 0x58 + 0x30 + 0x01 + 0x02 + 0xD8
13. AUTOMOBILE ENGG. DEPARTMENT Page 13
CHAPTER 2
LITERATURE REVIEW
Ravi Bhushan Tiwari & Sanjay Sharma[1]:Fingerprint identification is one of the most important
approaches for identification. Fingerprint identification has been publicized because of its consistency and
uniqueness over the period of time. Biometric identification process has gained popularity with the recent
advancement of computing capability. The uniqueness of the fingerprint and the processing power has
gained popularity in various walks of our life for the purpose of authentication and verification. This study
describes a fingerprint identification system and its implementation to establish the identity of a person. The
approach presented herein matches the fingerprint on two parameter minutia and furrows.
Anil K. Jain, Arun Ross & Salil Prabhakar[2]:A wide variety of systems requires reliable person
al recognition schemes to either confirm or determine the identity of an individual requesting their services.
The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user an
d no one else. Examples of such applications include secure access to buildings, computer systems, laptops,
cellular phones, and ATMs. In the absence of robust personal recognition schemes, these systems are vulner
able to the wiles of an impostor. Biometric recognition or, simply, biometrics refers to the automatic recogni
tion of individuals based on their physiological and/or behavioral characteristics. By using biometrics, it is p
ossible to confirm or establish an individual’s identity based on “who she is,” rather than by “what she posse
sses” (e.g., an ID card) or “what she remembers” (e.g., a password). In this paper, we give a brief overview o
f the field of biometrics and summarize some of its advantages, disadvantages, strengths, limitations, and rel
ated privacy concerns.
Index Terms—Biometrics, identification, multimodal biometrics, recognition, verification.
M.L. Gavrilova [3]:Respect to all aspects of information access and sharing. Notable progress has been
made Over the past decade, the security research domain has witnessed tremendous growth in
in developing successful approaches to tackle the problems of user authentication, password protection,
network security, data encryption, and information privacy. In the field of security research, biometric-based
authentication firmly established itself as one of the most reliable, efficient, and versatile tools for providing
discretionary access control to a secure resource or system.While state-of-the art methods for biometric
authentication are becoming increasingly more powerful and better understood, the same unfortunately
cannot be said about the security of users populating on-line communities or Cyber worlds.
Ensuring safe and secure communication and interaction among users and, respectably, their on-line
identities presents unique challenges to academics, as well as industry and the public. Security breaches,
credit card fraud, identity theft, criminal on-line activities, and cyber bullying are just some of the
Cyberworld security issues that plague society. Despite the fact that those challenges are regularly making
headlines in the news, government reports, and in the IT security domain, there is an appalling lack of effort
to address this urgent problem. The efforts that do exist are currently limited to network security, password
protection, encryption, database security and privacy policy-making efforts. However, one of the most
14. AUTOMOBILE ENGG. DEPARTMENT Page 14
crucial components for ensuring on-line security – the relationship of online communication among users,
and their identities in the real world – has been largely overlooked. A systematic study, and targeted effort to
develop effective security solutions to this crucial concern is the main focus of this paper.
Filip Orság & Martin Drahanský [4]:This paper deals with the design of a biometric security
system based upon the fingerprint and speech technology. In the first chapter there are the biometric security
systems and a concept of an integration of the both technologies introduced. Then the fingerprint technology
followed by the speech technology is shortly described. There are discussed some basic principles of each of
the technologies.
Keywords: fingerprint, speaker, recognition, biometric, security.
Emin Martinian, Sergey Yekhanin & Jonathan S. Yedidia[5]:Observing secure biometric
storage problem and develop a solution using syndrome codes. Specifically, biometrics such as fingerprints,
irises, and faces are often used for authentication, access control, and encryption instead of passwords.
While it is well known that passwords should never be stored in the clear, current systems often store
biometrics in the clear and are easily compromised. We describe the secure biometric storage problem by
discussing the insecurities in current systems, the reasons why password hashing/encryption algorithms are
unsuitable for biometrics, and propose a secure biometric storage framework based on syndrome codes and
the Slepian-Wolf theorem.
Kresimir Delac, Mislav Grgic[6]:Biometric recognition refers to an automatic recognition of
individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic.
Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or
determine the identity of an individual. Applications of such a system include computer systems security,
secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services.
By using biometrics a person could be identified based on "who she/he is" rather then "what she/he has"
(card, token, key) or "what she/he knows" (password, PIN). In this paper, a brief overview of biometric
methods, both unimodal and multimodal, and their advantages and disadvantages, will be presented.
Keywords: Biometrics, Multimodal Biometrics, Recognition, Verification, Identification, Security.
Anil K. Jain, Lin Hong & Sharath Pankanti [7]:Personal recognition schemes to either confirm
or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure
that the rendered services are accessed only by a legitimate user, and not anyone else. Examples of such
applications include secure access to buildings, computer systems, laptops, cellular phones and ATMs. In the
absence of robust personal recognition schemes, these systems are vulnerable to the wiles of an impostor.
Biometric recognition, or simply biometrics, refers to the automatic recognition of individuals based on their
physiological and/or behavioral characteristics. By using biometrics it is possible to confirm or establish an
individual’s identity based on “who she is”, rather than by “what she possesses” (e.g., an ID card) or “what
she remembers” (e.g., a password). In this paper, we give a brief overview of the field of biometrics and
summarize some of its advantages, disadvantages, strengths, limitations, and related privacy concerns. Index
Terms: Biometrics, Recognition, Verification, Identification, Multimodal Biometrics.
15. AUTOMOBILE ENGG. DEPARTMENT Page 15
Siddhesh Angle, Reema Bhagtani & Hemali Chheda[8]:Biometrics refers to the automatic
identification of a person based on his/her physiological or behavioral characteristics. This method of
identification is preferred over traditional methods involving passwords and PIN numbers for its accuracy
and case sensitiveness. A biometric system is essentially a pattern recognition system which makes a
personal identification by determining the authenticity of a specific physiological or behavioral
characteristic possessed by the user. An important issue in designing a practical system is to determine how
an individual is identified. Depending on the context, a biometric system can be either a verification
(authentication) system or an identification system. Verification involves confirming or denying a person's
claimed identity while in identification, one has to establish a person's identity. Biometric systems are
divided on the basis of the authentication medium used. They are broadly divided as identifications of Hand
Geometry, Vein Pattern, Voice Pattern, DNA, Signature Dynamics, Finger Prints, Iris Pattern and Face
Detection. These methods are used on the basis of the scope of the testing medium, the accuracy required
and speed required. Every medium of authentication has its own advantages and shortcomings. With the
increased use of computers as vehicles of information technology, it is necessary to restrict unauthorized
access to or fraudulent use of sensitive/personal data. Biometric techniques being potentially able to
augment this restriction are enjoying a renewed interest.
Erdem Yoruk, Helin Dutagaci & Bulent Sankur[9]: The potential of hand-shape and hand-
texture based biometry is investigated and algorithms are developed. Feature extraction stage is preceded by
meticulous registration of the deformable shape of the hand. Alternative features addressing hand shape and
hand texture are investigated. Independent component analysis features prove to be the best performing in
the identification and verification tasks. It is shown that hand biometric devices can be built that perform
reliably for a population of at least half a thousand.
Keywords: Biometry. Identification and verification. Principal and independent components. Registration
for deformable shapes. Distance transform.
Julian Ashbourm[10]:The ID3D hand geometry reader, currently the most popular of the commercially
available units, installed at over 4000 locations, works by comparing the three dimensional image of the
hand with a previously enrolled sample. It is extremely easy to use and requires no technical expertise on
behalf of the user, who simply enters his number on a keypad and places his hand on the platter. Actual
verification typically takes around one second, with the whole cycle of keying in a number and placing the
hand on the platter taking around four to six seconds. This compares favourably with card based systems. In
fact a card may be used in conjunction with the hand reader, in which case the PIN is input from the card.
Entering the PIN, either from the integral keypad or from a card swipe, calls up the correct template from
the systems memory so that comparison with the presented hand can take place. The image of the hand is
captured by a CCD digital camera and subsequently analysed by software running on a buitt in HD64180
microprocessor. Identifying characteristics based on geometric measurements are compared with enrolled
templates, with a match or no match resutt dependent on previously determined case.
16. AUTOMOBILE ENGG. DEPARTMENT Page 16
Syuichi Yasuoka, Yousun Karig, Ken'ichi Morooka & Hiroshi Nagahashi[11]:Texture
analysis is an important and useful area in computer vision and pattern recognition. Image texture is
constituted by various colors and luminance, so that its model can be represented as a mathematical function
with variation of pixel intensities. Many methods such as statisticid, geometrical, model based and signal
processing methods have been devised to extract the local or global features from texture images [I]. The
effectiveness of the extracted feature set depends on how well patterns from different classes can be
seperated on the feature space. Texture classification involves deciding what texture category an extracted
feature distribution belongs to. Statistical feature can be represented by a large number of feature vectors in
high diemensional feature space. Many approaches to designing a classifier are trying to solve the problems
of high dimensional feature vectors as well as a large number of classes. The choice of an efficient
discriminant function is also important to reduce the computational complcxity of enormous amount of
statistical features.
Juyang Weng and Wey-Shiuan Hwang[12]:They propose a new technique which incrementally
derive discriminating features in the input space. This technique casts both classification problems (class
labels as outputs) and regression problems (numerical values as outputs) into a unified regression problem.
The virtual labels are formed by clustering in the output space. We use these virtual labels to extract
discriminating features in the input space. This procedure is performed recursively. We organize the
resulting discriminating subspace in a coarse-to-fine fashion and store the information in a decision tree.
Such an incrementally hierarchical discriminating regression (IHDR) decision tree can be realized as a
hierarchical probability distribution model. We also introduce a sample size dependent negativelog-
likelihood (NLL) metric to deal with large-sample size cases, small-sample size cases, and unbalanced-
sample size cases. This is very essential since the number of training samples per class are different at each
internal node of the IHDR tree. We report experimental results for two types of data: face image data along
with comparison with some major appearance-based method and decision trees, hall way images with
driving directions as outputs for the automatic navigation problem – a regression application.
Michael Goh Kah Ong, Tee Connie, Andrew Teoh Beng Jin, David Ngo Chek
Ling[13]:Several contributions have shown that fusion of decisions or scores obtained from various
single-modal biometrics verification systems often enhances the overall system performance. A recent
approach of multimodal biometric systems with the use of single sensor has received significant attention
among researchers. In this paper, a combination of hand geometry and palmprint verification system is being
developed. This system uses a scanner as sole sensor to obtain the hands images. First, the hand geometry
verification system performs the feature extraction to obtain the geometrical information of the fingers and
palm. Second, the region of interest (ROI) is detected and cropped by palmprint verification system. This
ROI acts as the base for palmprint feature extraction by using Linear Discriminant Analysis (LDA). Lastly,
the matching scores of the two individual classifiers is fused by several fusion algorithms namely sum rule,
weighted sum rule and Support Vector Machine (SVM). The results of the fusion algorithms are being
compared with the outcomes of the individual palm and hand geometry classifiers. We are able to show that
fusion using SVM with Radial Basis Function (RBF) kernel has outperformed other combined and
individual classifiers.
17. AUTOMOBILE ENGG. DEPARTMENT Page 17
Karthik Nandakumar and Anil K. Jain[14]:Unimodal biometric systems are often affected by
several practical problems like noisy sensor data, nonuniversality and/or lack of distinctiveness of the
biometric trait, unacceptable error rates, and spoof attacks. Multimodal biometric systems overcome some of
these problems by consolidating the evidence obtained from different sources [1]. In a multimodal biometric
system, various levels of fusion are possible: fusion at the feature extraction level, matching score level or
decision level. Integration at the matching score level is generally preferred due to the ease in accessing and
combining matching scores.
Ram Meshulam, Shulamit Reches, Aner Yarden and Sarit Kraus [15]:Security systems can
observe and hear almost anyone everywhere. However, it is impossible to employ an adequate number of
human experts to analyze the information explosion. In this paper, we present an autonomous multi-agent
framework which, as an input, obtains biometric information acquired at a set of locations. The framework
aims in real-time to point out individuals who act according to a suspicious pattern across these locations.
The system works in large-scale scenarios. We present two scenarios to demonstrate the usefulness of the
framework.
Luisa Riccardi, Bruno Peticone and Mario Savastano [16]:The increase in securig measures
due to the compler international situation is forcing the realization of several access control systems
equipped with biometric identipem. Apart from technical problems, a number of nontechnical issues,
strong& related to the user’s acceptance, may have a strong influence on the design of the application and
suggest particular choices in the selection of the biometric technique to be adopted, Starfing from the
assumption that facial recognition represents one of the most widely “accepted” biometric techniques, and
that, due to confradictory performances shown in operating conditions, this methodology is seldom
considered for high-securiq applications, the Authors have investigated the possibiliq of improving the error
figures by means of 4n original approach. The innovation consists in “enriching” the template obtained by
means of canonical facial recognition algorithms with additional information extracted from behavioral
characteristics of the user. The study, still in the early stage, is carried out in the framework of a
collaboration between the National Research Council of Italy (CNR) and the Italian Ministry of the Defense
(MoDj in the area of the strong authentication for physical access to militarry compounds. The aim of the
preseni paper is only the highlighting of the poientialify of such an approach since first experimental data
are not mature to generate consolidated error figures such as FAR and FRR. In any event, a very good
capability in distinguishing between identical huh, a very welt known problem in facial recognition, is a
promising preamble for the continuation uf the research.
Index terms - Biometrics, access control, facial recognition.
Sharath Chikkerur, Sharath Pankanti, Nalini Ratha and Ruud Bolle[17]:Minutiae
extraction is one of the critical steps in fingerprint verification algorithms. Any missing minutiae or spurious
minutiae introduced at this stage can degrade the performance of the matching algorithm. Existing structural
approaches for minutiae filtering use heuristics and adhoc rules to eliminate such false positives, where as
gray level approaches are based on using raw pixel values and a supervised classifier such as neural
networks. We propose two new techniques for minutiae verification based on non-trivial gray level features.
The proposed features intuitively represents the structual properties of the minutiae neighborhood leading to
better classification. We use directionally selective steerable wedge filters to differentiate between minutiae
and non-minutiae neighborhoods with reasonable accuracy. We also propose a second technique based on
18. AUTOMOBILE ENGG. DEPARTMENT Page 18
Gabor expansion that results in even better discrimination. We present an objective evaluation of both the
algorithms. Apart from minutiae verification, the feature description can also be used for minutiae detection
and minutiae quality assessment.
Tami R. Randolph and Mark J. T. Smith[18]:In this paper, we explore a novel approach to
enhancing fingerprint images using a new binary directional filter bank (DFB). Automated fingerprint
identification systems (AFIS) are used to classify a fingerprint in a large volume of images. Many
approaches to AFIS have been suggested, most sharing in common the idea of extracting discriminate
feature representations. As part of that process, the raw fingerprints are often smoothed, converted to binary
and thinned. Conventional directional methods, which have been used successfully in the past, provide
representations that delineate the directional components in the fingerprint image enabling separation, and
enhancement. Our binary DFB receives a binary input and outputs a binary image set comprised of
directional components. Through proper weighting and manipulation of the subbands, specific features
within the fingerprint can be enhanced. We propose a new enhancement approach that remains in the binary
domain for the entire process.
19. AUTOMOBILE ENGG. DEPARTMENT Page 19
CHAPTER 3
METHODOLOGY :
Three new approaches have been recently to biometric technology with implications for Cyberworld
security:
a) exploring the capabilities of multi-modal biometric fusion methods in the context of
Cyberworld user identity recognition;
b) developing a set of metrics for identifying abnormal user behaviours through recognition of their
physiological and behavioural traits; and
c) introducing the notion of biometric cancellability in the context of Cyber world authentication.
These new approaches will provide a powerful and unique methodology for enhancing user security in on-
line communities, and society as a whole. Thus we did the costing of the project and accordingly bought the
raw materials & then we learnt to read the electronic circuit and do the programming on ATMEL platform.
Then we designed the circuit with the help of pro-electronic engineer and technician.
The methodology can be further extended to relevant domains, including multimedia, text and image
categorization, multi-modal image retrieval and web based social network analysis.
Work by the researchers and collaborators of Biometric Technologies lab demonstrate the potential of using
machine intelligence and context-based biometrics in the design of new generation security systems.
The recent book “Multimodal Biometrics and Intelligent Image Processing for Security Systems” published
by IGI outlines a number of methodologies. It argues for the use of multi-modal biometric system, rather
than the traditional single biometric approach. It has been well established over the last decade that
individual biometrics have a number of deficiencies, including issues of universality, uniqueness, changes
over time, behaviour state dependence, poor sample quality, and human error. Due to the fact that
multimodal biometric system can incorporate two or more individual biometric traits, the overall system
recognition rate can increase significantly. This remains true even in the presence of erroneous, incomplete
or missing data.
The second direction will leverage the behavioural biometrics for abnormal behavior detection and
risk management in online community users. Biometrics has come close to avatar development and
intelligent robots/software authentication many times before. In 1998 M.J. Lyons et.al. published “Avatar
Creation using Automatic Face Recognition”, where authors discuss specific steps that need to be taken in
order for avatars to be created automatically from the human face. A recently published paper demonstrated
the possibility of using behavioural biometric strategies designed to recognize humans to identify artificially
created intelligent software agents used to gain an unfair advantage by some members of multiplayer online
communities. The paper lays the theoretical groundwork for research in authentication of non-biological
entities. Behavioral characteristics are even less likely to change than the avatar’s facial appearance and
clothes, as users typically invest a lot of time and money into creation of a consistent virtual image but
would not so easily change their patterns of behavior. The artificial intelligence learning methods based on
chaotic neural networks can be successfully utilized to learn normal and abnormal user behavioral patterns.
20. AUTOMOBILE ENGG. DEPARTMENT Page 20
3.1. STEPS INVOLVED IN BIOMETRIC RECOGNITION USING FINGERPRINT SCANNING:
fig: 2.1 sequence of actions
21. AUTOMOBILE ENGG. DEPARTMENT Page 21
CHAPTER 4
AIMS AND OBJECTIVES:
The main objective of this project and its technological implications is to increase the security measure for
the vehicle and also make it more convenient.Following are some major intricate understanding from the
projects which has lead to broaden our objectives and aim, many of which are subject to future research
works. “Big data” challenges that demand real-time performance with high recognition rates on very large
data repositories..Need for better privacy policies and their enforcement to protect user confidentiality;.
Changes in databases over time might require more sophisticated training and learning methods. Ability to
use contextual information obtained in parallel to main biometric features:-
a) Development of more advanced information fusions methods that have the ability to adapt to
biometric system changes (such as the addition of a new module or data source) while maintaining a
required level of precision.
b) Detection of normal vs. abnormal on-line user behavior through advanced pattern analysis of
appearance-based and behavioral biometrics (typing patterns, voice, text, blogs);
c) Investigating on-line social network activities as new type of biometric traits, i.e. “social biometrics”
(Twitter, Wikipedia, Facebook and LinkedIn social networks etc);
d) Emerging research into spatio-temporal biometrics for on-line communities;
e) Further development of artificial biometrics domain (Artimetrics) with new data obtained on avatars,
bots and other entities in virtual worlds;
f) Understanding mechanism that contribute to creating successful on-line communities; and
g) Studying leadership and popular personality traits in Cyber worlds
The applications of biometrics can be divided into the following three main groups:
• Commercial applications such as computer network login, electronic data security, ecommerce, Internet
access, ATM, credit card, physical access control, cellular phone, PDA,
medical records management, distance learning, etc.
• Government applications such as national ID card, correctional facility, driver’s license, social security,
welfare-disbursement, border control, passport control, etc.
• Forensic applications such as corpse identification, criminal investigation, terrorist identification,
parenthood determination, missing children, etc.
Traditionally, commercial applications have used knowledge-based systems (e.g., PINs and passwords),
government applications have used token-based systems (e.g., ID cards and badges), and forensic
applications have relied on human experts to match biometric features. Biometric systems are being
increasingly deployed in large scale civilian applications (see Figure 4). The Schiphol Privium scheme at the
Amsterdam airport, Readings, employs iris scan cards to speed up the passport and visa control procedures.
Passengers enrolled in this scheme insert their card at the gate and look into a camera; the camera acquires
the image of the traveller's eye and processes it to locate the iris, and compute the Iriscode the computed
Iriscode is compared with the data residing in the card to complete user verification. A similar scheme is
also being used to verify the identity of Schiphol airport employees working in high-security areas. Thus,
biometric systems can be used to enhance user convenience while improving security.
22. AUTOMOBILE ENGG. DEPARTMENT Page 22
CHAPTER 5
RESULT AND ANALYSIS
Biometrics is a rapidly evolving technology that has been widely used in forensics, such as criminal identific
ation and prison security. Biometric identification is also under serious consideration for adoption in a broa
d range of civilian applications. E-commerce and e-banking are two of the most important application are
as due to the rapid progress in electronic transactions. These applications include electronic fund transfers, A
TM security, check cashing,
credit card security, smartcards security, and online transactions. There are currently several large biometric
security projects in these areas under development, including credit card security (MasterCard) and smart
card security (IBM and American Express). A variety of biometric technologies are now competing to de
monstrate their efficacy in these areas.The market of physical access control is currently dominated by token
-based technology. However, it
is predicted that, with the progress in biometric technology, market share will increasingly shift to bi
ometric techniques. Information system and computer-network secu-
rity, such as user authentication and access to databases via remote login is another potential application
area. It is expected that more and more information systems and computer-networks will be secured with bio
metrics with the rapid expansion of Internet and intranet. With the introduction of biometrics, government b
enefits distribution programs such as welfare disbursements will experience substantial savings in dete
rring multiple claimants. In
addition, customs and immigration initiatives such as INS Passenger Accelerated Service System(INSPA
SS), which permits faster processing of passengers at immigration checkpoints based on hand geometry, wil
l greatly increase the operational efficiency. A biometric-based national identification system provides a
unique ID to the citizens and integrates different government services. Biometrics based voter registrat
ion prevents voter fraud; and
biometrics-based driver registration enforces issuing only a single driver license to a person; and biometrics-
based time/attendance monitoring systems prevent abuses of the current token-based manual systems. H
umans have used fingerprints for personal identification for centuries and the validity of fingerprint ident
ification has been well-established [6]. A fingerprint is the pattern of ridges and furrows on the surface of a
fingertip, the formation
of which is determined during the fetal period. They are so distinct that even fingerprints of identical twi
ns are different as are the prints on each finger of the same person.
With the development of solid-state sensors, the marginal cost of incorporating a fingerprint-based COM
MUNICATIONS OF THE ACM February 2000/Vol. 43, No. 2 95biometric system may soon become aff
ordable in many applications. Consequently, fingerprints are expected to lead the biometric applications i
n the near future, with multiple fingerprints providing sufficient information to allow for large-scale reco
gnition involving millions of identities.
One problem with fingerprint technology is its lack of acceptability by a typical user, because fingerprint
s have traditionally been associated with criminal investigations and police work. Another problem is th
at automatic fingerprint identification generally requires a large amount of computational resources. Fi
nally, finger prints of a small fraction of a population may be unsuitable for automatic identification
because of genetic, aging, environmental, or occupational reasons. Hand geometry. A variety of measur
ements of the human hand, including its shape, and lengths and widths of the fingers,. The prominent local ri
23. AUTOMOBILE ENGG. DEPARTMENT Page 23
dge is referred to as minutiae. This characteristic of the finger print image is used to compare an individual’s
finger image with the others stored finger images. Minutiae consist of ridge ending, ridge bifurcation, short
ridge, or independent ridge, island, ridge enclosure, spur, crossover or bridge, delta and core. Ridge ending i
s the abrupt end of a ridge; a single ridge that divides into two ridges is ridge bifurcation, ridge that commen
ces, travels a short distance and then ends is termed as short ridge, or independent ridge. Island is a single s
mall ridge inside a
short ridge, a single ridge that bifurcates and reunites shortly afterward to continue as a single ridge is called
ridge enclosure. Spur is a bifurcation with a short ridge branching off a longer ridge whereas; crossover or
bridge is a short ridge that runs between two parallel ridges. Y-shaped ridge meeting is known as a delta and
core is a U-turn in the ridge pattern. A good quality fingerprint contains 25 to 80 minutiae depending on the
sensor resolution and finger placement on the sensor. In some cases, it is difficult to extract prominent
minutia, as the
fingerprint impression is distorted due to various reasons like dry skin, injury, scars etc. This poor quality
fingerprint image leads to false minutia. False minutia is the false positive result due to insufficient ink or
due to cross connect of over-inking. A fingerprint image of an optical sensor.
Fingerprint recognition system mainly works on two stages minutiae extraction and minutiae matching (Fig.
5). In this approach, system takes two input fingerprints to be matched and it gives the percentage of
matching between two images. As we can see in figure 5, the minutiae extractor can be further classified
into three sub-modules such as image segmentation, image enhancement and final extraction. In figure 5,
minutiae matcher can also be further classified into two sub-modules such as minutiae alignment and match.
Image segmentation and image enhancement are further sub-divided in image binariztion, histogram
equalization and fast Fourier transformation (Jain et al., 1993). Further image
enhancement uses the approach of Binarization so that image can be sharp. The minutiae location and the
minutiae angles are derived after minutiae extraction. The terminations which lie at the outer boundaries are
not considered as minutiae points. Crossing number is used to locate the minutiae points in fingerprint
image. Crossing number is defined as half of the sum of differences between intensity values of two adjacent
pixels. If crossing number is 1, 2 and 3 or greater than 3 then minutiae points are classified as termination,
normal ridge and bifurcation respectively. We can see all these points in figure 8. Figure 9 shows the
original image and the extracted minutiae points. Square shape shows the position of termination and
diamond shape shows the position of bifurcation as in figure 9a and b.
ρkt = radial distance of kth minutiae
φkt = radial angle of kth minutiae
θkt = orientation angle of kth minutiae
rot = row index of reference points currently being considered
cot= column index of reference points currently being considered
rkt = row index of kth points currently being considered
ckt= column index of kth points currently being considered.
24. AUTOMOBILE ENGG. DEPARTMENT Page 24
TABLE : 5(a) commands
S.NO. : NAME OF COMMAND COMMAND
CODE
1. Add Fingerprint 0X40
2. Delete Fingerprint 0X42
3. Search Fingerprint 0X44
4. Empty Fingerprint Database 0X46
5. Search Information in Fingerprint Database 0X48
6. Download Fingerprint Tempelate 0X50
7. Upload Fingerprint Tempelate 0X52
8. Read ID Number 0X60
9. Read user Flash 0X62
10. Write User Flash 0X64
11. Read Product Logo 0X80
25. AUTOMOBILE ENGG. DEPARTMENT Page 25
TABLE 5(b) Response codes
S.NO. : NAME OF COMMAND COMMAND CODE
1. Receive correct 0X01
2. Receive Error 0X02
3. Operation successful 0X31
4. Finger detected 0X32
5. Time out 0X33
6. Fingerprint process failure 0X34
7. Parameter error 0X35
8. Matching id found 0X34
9. No Matching id found 0X37
10. fingerprint found 0X39
11. Fingerprint not found 0X40
26. AUTOMOBILE ENGG. DEPARTMENT Page 26
5.1. PROGRAMMING SEQUENCE AND LOGIC:
1) HOST send command to search
16 fingerprints starting from 0:
0x4D + 0x58 + 0x10 + 0x05 + 0x44 + 0x00 + 0x00 + 0x00 + 0x10 + 0x0E
2) When the fingerprint is placed on the sensor window, module will respond as
operation successful:
0x4D + 0x58 + 0x30 + 0x02 + 0x44 + 0x31 + 0x4C
3) If the fingerprint is found, module will return the following:
0x4D + 0x58 + 0x30 + 0x04 + 0x44+ 0x39 + high bytes of ID for the found
fingerprint + low bytes of ID for the found fingerprint + check sum
4) If no matching fingerprint is found, module will return the following:
0x4D + 0x58 + 0x30 + 0x02 + 0x44 + 0x3A + 0x55 Readings:
1 HOST send command to search 16 fingerprints starting from 0:
0x4D + 0x58 + 0x10 + 0x05 + 0x44 + 0x00 + 0x00 + 0x00 + 0x10 + 0x0E
2 When the fingerprint is placed on the sensor window, module will respond as
operation successful:
0x4D + 0x58 + 0x30 + 0x02 + 0x44 + 0x31 + 0x4C
3 If the fingerprint is found, module will return the following:
0x4D + 0x58 + 0x30 + 0x04 + 0x44+ 0x39 + high bytes of ID for the found
fingerprint + low bytes of ID for the found fingerprint + check sum
If no matching fingerprint is found,
Remarks:
1 The number of the fingerprints that are searched starts from the ID of the first
fingerprint, Readings, the search starts from fingerprint ID 0. the number of
fingerprints searched is 0x10,then the fingerprint ID actually being searched is 0~
0x0F, altogether 0x10 fingerprints.
2 If the ID in the command is wrong, module will responds as parameter error:
0x4D + 0x58 + 0x30 + 0x02 + 0x44 + 0x35 + 0x50
3If the fingerprint quality is poor, module will respond as fingerprint processing
failure:
0x4D + 0x58 + 0x30 + 0x02 + 0x44 + 0x34 + 0x4F
27. AUTOMOBILE ENGG. DEPARTMENT Page 27
4 If there is no finger placing on the sensor with 10 seconds, module will respond
as time out:
0x4D + 0x58 + 0x30 + 0x02 + 0x44 + 0x33 + 0x4E
5) Empty Fingerprint Database
Description: Empty all fingerprints in fingerprint database
Length:1 byte
Format:Command code 0x46
Readings:
1 HOST send command to empty fingerprint database:
0x4D + 0x58 + 0x10 + 0x01 + 0x46 + 0xFC
2 Module will respond as Rx correct: 0x4D + 0x58 + 0x30 + 0x01 + 0x01 +
0xD7
3 Module will respond as operation successful after executing command to empty
fingerprint database:
0x4D + 0x58 + 0x30 + 0x02 + 0x46 + 0x31 + 0x4E
6) Search Fingerprint Database Information
Description:Search and see if there is fingerprint matching the designated ID
Length:3 bytes
Format:Command code 0x4B + high byte of the to-be-searched fingerprint ID + low
byte of the to-be-searched fingerprint ID
Readings:
1 HOST send command to search fingerprint with ID 0:
0x4D + 0x58 + 0x10 + 0x03 + 0x4B + 0x00 + 0x00 + 0x03
2 Module will respond as Rx correct: 0x4D + 0x58 + 0x30 + 0x01 + 0x01 +
0xD7
3 If there is fingerprint with ID 0, module will return the following:
0x4D + 0x58 + 0x30 + 0x02 + 0x4B + 0x37 + 0x59
4 If there is no fingerprint with ID 0, module will then return the following:
0x4D + 0x58 + 0x30 + 0x02 + 0x4B + 0x38 + 0x5A
Remarks:
28. AUTOMOBILE ENGG. DEPARTMENT Page 28
1 If the fingerprint ID in the command is out of range, module will respond as
parameter error:
0x4D + 0x58 + 0x30 + 0x02 + 0x4B + 0x35 + 0x57
7) Download Fingerprint Template
Description:Download a fingerprint into the module
Length:3 bytes
Format:Command code 0x50 + high byte of the to-be-downloaded fingerprint ID +
low byte of the to-be-downloaded fingerprint ID
Readings:
1 HOST send a command to download a fingerprint to the position for ID 0:
0x4D + 0x58 + 0x10 + 0x03 + 0x50 + 0x00 + 0x00 + 0x08
2 Module will respond as Rx correct: 0x4D + 0x58 + 0x30 + 0x01 + 0x01 +
0xD7
3 HOST send the first data packet (packet content 128):
0x4D + 0x58 + 0x20 + 0x80 + ……128 bytes of data…… + check sum
4 Module will respond as Rx correct: 0x4D + 0x58 + 0x30 + 0x01 + 0x01 +
0xD7
5 HOST send the second data packet (packet content 128):
0x4D + 0x58 + 0x21 + 0x80 + ……128 bytes of data…… + check sum
6 Module will respond as Rx correct: 0x4D + 0x58 + 0x30 + 0x01 + 0x01 +
0xD7
7 Module will respond as operation successful: 0x4D + 0x58 + 0x30 + 0x02 +
0x50 + 0x31 + 0x58
Remarks:
1 If the fingerprint ID in the command is wrong, module will respond as
parameter error:
0x4D + 0x58 + 0x30 + 0x02 + 0x50 + 0x35 + 0x5C
8) Upload Fingerprint Template
Description:Upload fingerprint template with the designated ID
Length:3 bytes
Format:Command code 0x52 + high byte of the to-be-uploaded fingerprint ID + low
29. AUTOMOBILE ENGG. DEPARTMENT Page 29
byte of the to-be-uploaded fingerprint ID.
Readings:
1 HOST send a command to upload a fingerprint to the position for ID 0:
0x4D + 0x58 + 0x10 + 0x03 + 0x52 + 0x00 + 0x00 + 0x0A
2 Module will respond as Rx correct: 0x4D + 0x58 + 0x30 + 0x01 + 0x01 +
0xD7
3 Module send the first data packet
0x4D + 0x58 + 0x20 + 0x80 + ……128 bytes of data…… + check sum
4 HOST will respond as Rx correct 0x4D + 0x58 + 0x30 + 0x01 + 0x01 + 0xD7
5 Module send the second data packet
0x4D + 0x58 + 0x21 + 0x80 + ……128 bytes of data…… + check sum
Remarks:
1 If the fingerprint ID in the command is wrong, module will respond as
parameter error:0x4D + 0x58 + 0x30 + 0x02 + 0x52 + 0x35 + 0x5E
9) Read ID Number
Description:Read module ID number
Length:1 byte
Format:Command code 0x60
Example:
1 HOST send a command to read Module ID number:
0x4D + 0x58 + 0x10 + 0x01 + 0x60 + 0x16
2 Module will respond as Rx correct: 0x4D + 0x58 + 0x30 + 0x01 + 0x01 +
0xD7
3 Module will respond by 24-byte ID number after executing the command:
0x4D + 0x58 + 0x30 + 0x19 + 0x60 + ……24-byte ID number…… + check sum
Remarks:
1 ID number is set by manufacturer. User can read ID number only. Each module has
its own ID number. User can tell different module by reading ID number.
10) Read User Flash
Description:Read the content of the designated address in user flash in the module
Length:4 bytes
30. AUTOMOBILE ENGG. DEPARTMENT Page 30
Format:Command code 0x62 + read high bytes of the address + read low bytes of
the address + read the number
Readings:
1 HOST send command to read 10 data starting from ADD 0 in user flash:
SM630 USER MANUAL All Rights Reserved
Page 22 of 29
0x4D + 0x58 + 0x10 + 0x04 + 0x62 + 0x00 + 0x00 + 0x0A + 0x25
2 Module will respond as Rx correct: 0x4D + 0x58 + 0x30 + 0x01 + 0x01 +
0xD7
3 Module will respond by the data it read:
0x4D + 0x58 + 0x30 + number of data read + 0x62 + ……data read…… + check
sum
Remarks:
1 The memory is 64K bytes in user flash (ADD 1~0xFFFF). Maximum 128Byte
data can be read at one time.
11) Write User Flash
Description:Write data in the designated address in user Flash
Length:N+4 bytes
Format:Command code 0x64 + high bytes of the address where data to be written
+ low bytes of the address where data to be written + number of data to be written
+ ……N bytes of data to be written……
Readings:
1 HOST send a command to write 2 Byte data in to the ADD 0 in user Flash
0x4D + 0x58 + 0x10 + 0x06 + 0x64 + 0x00 + 0x00 + 0x02 + 0x00 + 0x00 +
0x21
2 Module will respond as Rx correct: 0x4D + 0x58 + 0x30 + 0x01 + 0x01 +
0xD7
3 Module will respond after executing the command:
0x4D + 0x58 + 0x30 + 0x02 + 0x64 + 0x31 + 0x6C
Remarks:
1 The memory is 64K bytes in user flash. Maximum 128Byte data can be written
at one time.
31. AUTOMOBILE ENGG. DEPARTMENT Page 31
CHAPTER 6
CONCLUSION:
In this study, the given implementation was an effort to understand how fingerprint recognition is used as a
form of biometric to recognize identities of human beings. It includes all the stages like (image
enhancement, histogram equalization, FFT, image segmentation image binarization, block direction
estimation ROI extraction, final minutiae extraction, minutiae alignment, minutiae match) from minutiae
extraction from fingerprints to minutiae matching which generates a match values. There are many
techniques which are used in the
intermediate stages of processing. It has relatively low percentage of verification rate as compared to other
forms of biometric identification indicates that the algorithm used is not very robust and is vulnerable to
effects like scaling and elastic deformations. Various new
techniques and algorithm have been found out which give better results. Also a major challenge in
fingerprint recognition lies in the pre processing of the bad quality of fingerprint images which also add to
the low percentage of verification.
Nowadays, a PIN code or a password is being used for the purposes of an authentication, which is the
weakest point of the whole system. Biometry offers one reasonable solution. Biometry should be used
instead of passwords and PIN codes. A user will be authenticated by his/her biometric attributes and he/she
will be either confirmed or refused. The confirmation or refusal depends on the acceptance of his/her
biometric attributes.
But the PIN and password replacement is not the only benefit of biometry. More might be got. Present
biometric technology is not advanced enough to be used for the cryptographic purposes, because it is very
difficult to detect and extract always the same or nearly the same features. The features are changing with
growth and age. Hence some rough rasterization (to avoid the position change of some feature) and subsets
computation (to ensure the repeatability of some part of the features) is necessary.
Where to go on in the future? It is obvious that biometric systems will govern the security domain in future
electronic world. The identification speed and accuracy will be the crucial factors. Therefore, the algorithms
may be optimized so that they can satisfy the strict conditions they will be exposed to during the regular
service. The next possibility is to implement these algorithms under a smart card operation system and
perform the fingerprint comparison directly at the smart card. It would increase the security and due to the
impossibility of an attack of the communication among the computer, fingerprint scanner and smart card
reader.
Reliable personal recognition is critical to many business processes. Biometrics refers to automatic
recognition of an individual based on her behavioral and/or physiological characteristics. The conventional
knowledge-based and token-based methods do not really provide positive personal recognition because they
rely on surrogate representations of the person’s identity (e.g., exclusive knowledge or possession). It is,
thus, obvious that any system assuring reliable personal recognition must necessarily involve a biometric
component. This is not, however, to state that biometrics alone can deliver reliable personal recognition
component. In fact, a sound system design will often entail incorporation of many biometric and non-
biometric components (building blocks) to provide reliable personal recognition.
32. AUTOMOBILE ENGG. DEPARTMENT Page 32
Biometric-based systems also have some limitations that may have adverse implications for the security of a
system. While some of the limitations of biometrics can be overcome with the evolution of biometric
technology and a careful system design, it is important to understand that foolproof personal recognition
systems simply do not exist and perhaps, never will. Security is a risk management strategy that identifies,
controls, eliminates, or minimizes uncertain events that may adversely affect system resources and
information assets. The security level of a system depends on the requirements (threat model) of an
application and the cost-benefit analysis. In our opinion, properly implemented biometric systems are
effective deterrents to perpetrators. There are a number of privacy concerns raised about the use of
biometrics. A sound trade-off between security and privacy may be necessary; collective
accountability/acceptability standards can only be enforced through common legislation. Biometrics
provides tools to enforce accountable logs of system transactions and to protect an individual’s right to
privacy.
As biometric technology matures, there will be an increasing interaction among the market,
technology, and the applications. This interaction will be influenced by the added value of the
technology, user acceptance, and the credibility of the service provider. It is too early to predict where and
how biometric technology would evolve and get embedded in which applications. But it is certain that
biometric-based recognition will have a profound influence on the way we conduct our daily business.
33. AUTOMOBILE ENGG. DEPARTMENT Page 33
CHAPTER 7
REFERENCES:
[1] Ravi Bhushan Tiwari & Sanjay Sharma, "Applications on Microelectronics and Computer
Engineering" International Symposium on Signal Processing and its Applications (ISSPA)), Kuala Lumpur.
Malaysia, I3 - I6 August, 2001. Australia Vol-2, PP-280-290.
[2] Anil K. Jain, Arun Ross & Salil Prabhakar, ” Video-Based Biometrics" Appeared in IEEE
Transactions on Circuits and Systems for Video Technology, Special Issue on Image, Vol. 14, No. 1, January
2004.
[3] M.L. Gavrilova, " Human Interface",International Conf. on Multimedia and Expo (ICMA) Vol.3,
July,2003 PP-241-244.
[4] Filip Orság & Martin Drahanský,International Conf. on Pattern Recognition
(ICPR),Vol.2, September,2000, PP 937-940.
[5] Emin Martinian, Sergey Yekhanin & Jonathan S. Yedidia, International Symposium on
biometrics, Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA.,vol-5,aug 2004.
[6] Kresimir Delac, Mislav Grgic, 46th International Symposium Electronics in Marine, ELMAR-2004, 16-
18 June 2004, Zadar, Croatia,vol.2,pp 243-253.
[7] Anil K. Jain, Lin Hong & Sharath Pankanti, Communications of the ACM,Vol.43
February, 2000 pp 91-98.
[8]Siddhesh Angle, Reema Bhagtani & Hemali Chheda, Department of Biomedical
Engineering, Thadomal Shahani Engineering College, T.P.S III, Bandra, Mumbai-50,vol.1,sept 2006.
[9] Erdem Yoruk, Helin Dutagaci & Bulent Sankur, Electrical and Electronic Engineering
Department, Boğaziçi University, Bebek, İstanbul, Turkey.vol.6, January 2006.
[10] Julian Ashbourm, IEE Colloquium on Image Processing for Biometric Measurement, April,1994,
pp-5/1-5/6.
[11] Syuichi Yasuoka, Yousun Karig, Ken'ichi Morooka & Hiroshi Nagahashi, 2004 IEEE
International Conference on Systems, Man and Cybernetics,vol-1,2004.
34. AUTOMOBILE ENGG. DEPARTMENT Page 34
[12] Juyang Weng and Wey-Shiuan Hwang[12], "hierarchy discrimination regression", Asian
Conference on Computer Vision (ACCV) ,Vol.3,January, 2000 , pp 426-431.
[13] Michael Goh Kah Ong, Tee Connie, Andrew Teoh Beng Jin, David Ngo Chek Ling,
"linear discriminate analysis", IEEE Trans. On Circuits and Systems for
VideoTechnology,Vol.14 ,January,2004, pp95-101.
[14] Karthik Nandakumar and Anil K. Jain, Pattern Recognition symposium,
New Delhi ,Vol.38,January2005 ,pp-2270-2285.
[15] Ram Meshulam, Shulamit Reches, Aner Yarden and Sarit Kraus, International Joint
Conference on Autonomous Agents and Multiagent Systems (AAMAS) ,Vol.8,May,2006,pp-1095-1097.
[16] Luisa Riccardi, Bruno Peticone and Mario Savastano, Proceedings of Systems, Man and
Cybernetics (SMC) Information Assurance Workshop,Vol.5,June,2005,pp-79-83.
[17] Sharath Chikkerur, Sharath Pankanti, Nalini Ratha and Ruud Bolle,
IEEE Workshops on Application of Computer Vision (WACV),Vol.,January,2005,pp:111-116.
[18] Tami R. Randolph and Mark J. T. Smith[18],International Conference on Acoustics, Speech
and Signal Processing (ICASSP),Vol.3,May,2001,pp:1561-1564.