1. PRESENTATION
Project Title:
“FINGERPRINT RECOGNITION FOR
. SECURITY”
By BISANGABAGABO Alphonse
Registration Number: GS20100516
Supervisor: Dr. NGARAMBE Donart.
2. ABSTRACT
Fingerprint recognition refers to the automated
method of verifying match between two human
fingerprints. This project will study on the use
of “Fingerprints” to improve the way student’s
identification for security is done within KIST.
The algorithm used is based on Fingerprint
Scanning, Fingerprint Matching, Identification
image. The Project implementation will use C
programming language as a programming tool.
3. INTRODUCTION
Nowadays, authentication is among the most
challenging issues in different sectors of life.
The use of ID cards, PINs, Passwords can be
forgotten or guessed, cards and badges can get
lost, stolen or lent to a friend for the illegal use.
The same case can happen in any institution.
This project is planned with objective of
finding accurate solution to that issue
specifically in KIST, where anybody has to
identify him/her self to a security guard using
card.
4. Introduction Cont’d
The use of Biometrics technology is the
solution. A fingerprint was found to have
specific characteristics (Minutiae) that are
unique to anybody. The advantage of using
Fingerprint recognition applications can be
summarized into three classes
Easy mode life
Prevent fraud
Control
5. INTRODUCTION Cont’d
The Oldest form of Biometrics
Highly Reliable
Uses distinctive features of
fingers
No thief can steal it.
Never forgotten at home.
6. GENERAL OBJECTIVES
To replace token based authentication by biometric
recognition methods.
To build automatic and rapid system in order to optimize
the authentication check.
7. SPECIFIC OBJECTIVES
To apply new technology in everyday life in the vision of
avoiding fraud and security risk of being confused.
To remove students stress in case cards are forgotten or
lost.
To reduce task of security guards and let the decision be
automatic.
8. EXISTING SYSTEM
In KIST Fingerprint system already exists. It simply
monitors the employee’s arrival and/or leave time.
For student identification, cards are presented to a security
guard on entrance gates.
The existing system is limited in functionalities, new
features need to be added.
9. PROPOSED SYSTEM
Fingerprint image Fingerprint image
aquisition aquisition
image Processing
Compare
Stored in database Image
to
Processing
Database
Authorized Refused
10. PROBLEM STATEMENT
Some outside people enter the KIST gates using stolen or
borrowed students cards.
Some times, students miss classes when cards
forgotten, lost or stolen.
11. PROCESS
This project will proceed successive
stages following the modified waterfall
model. Each step starts when the previous
is finished
It is possible to review a finished stage
and make some modification whenever
needed.
12. SOFTWARE PLATFORM
Operating system (OS) Name: Microsoft Windows xp
Professional
OS version : 5.1.2600 Service Pack 2
Build 2600
OS Configuration : Standalone Workstation
Microsoft visual c++
Sql server 2005
13. HARDWARE
System manufacturer : Dell Computer Corporation
Model : Latitude D400
System type : X86-based PC
Processor: [01]: x86 family 6 Model 13 stepping 6 Genuine
Intel
1594 MHz
BIOS version: DELL – 27d40903
Physical memory: 510 MB
Virtual Memory: 2048
Storage: 60 GB
14. SCOPE OF PROJECT
This project “Fingerprint recognition for Security” will use
a sample of hundred (100) fingerprints because of the time
and resource limitation.
The system we will develop will be tested on a single
computer.
All the activities and researches of this project will take place
inside KIST using available and accessible resources.
17. FINGERPRINT
impression of the friction ridges of all or any part of
the finger.
Oldest form of Biometrics
Highly Reliable
Uses distinctive features of fingers
18. FINGERPRINT SCANNER/SENSOR
A fingerprint
sensor is an
electronic device
used to capture a
digital image of
the fingerprint
pattern.
19. FINGERPRINT
impression of the
friction ridges of all or
any part of the finger.
Oldest form of
Biometrics
Highly Reliable
20. APPLICATIONS
Personal computer / workstation security.
Network / enterprise security.
e-commerce / e-business.
Electronic transactions.
Physical Access Control (e.g. Airport)
Information System Security
National ID Systems
Identification of Criminals