SlideShare una empresa de Scribd logo
1 de 23
PRESENTATION

Project Title:
               “FINGERPRINT RECOGNITION FOR
 .                SECURITY”

By BISANGABAGABO Alphonse
Registration Number:   GS20100516

Supervisor:   Dr. NGARAMBE Donart.
ABSTRACT
Fingerprint recognition refers to the automated
method of verifying match between two human
fingerprints. This project will study on the use
of “Fingerprints” to improve the way student’s
identification for security is done within KIST.
The algorithm used is based on Fingerprint
Scanning, Fingerprint Matching, Identification
image. The Project implementation will use C
programming language as a programming tool.
INTRODUCTION
 Nowadays, authentication is among the most
challenging issues in different sectors of life.
The use of ID cards, PINs, Passwords can be
forgotten or guessed, cards and badges can get
lost, stolen or lent to a friend for the illegal use.
The same case can happen in any institution.
This project is planned with objective of
finding accurate solution to that issue
specifically in KIST, where anybody has to
identify him/her self to a security guard using
card.
Introduction Cont’d
 The use of Biometrics technology is the
  solution. A fingerprint was found to have
  specific characteristics (Minutiae) that are
  unique to anybody. The advantage of using
  Fingerprint recognition applications can be
  summarized into three classes
 Easy mode life
 Prevent fraud
 Control
INTRODUCTION Cont’d
 The Oldest form of Biometrics

 Highly Reliable

 Uses distinctive features of
  fingers

 No thief can steal it.

 Never forgotten at home.
GENERAL OBJECTIVES

 To replace token based authentication by biometric
 recognition methods.



 To build automatic and rapid system in order to optimize
 the authentication check.
SPECIFIC OBJECTIVES
 To apply new technology in everyday life in the vision of
  avoiding fraud and security risk of being confused.

 To remove students stress in case cards are forgotten or
  lost.

 To reduce task of security guards and let the decision be
  automatic.
EXISTING SYSTEM
 In KIST Fingerprint system already exists. It simply
  monitors the employee’s arrival and/or leave time.

 For student identification, cards are presented to a security
  guard on entrance gates.

 The existing system is limited in functionalities, new
  features need to be added.
PROPOSED SYSTEM
 Fingerprint image                      Fingerprint image
 aquisition                             aquisition



 image Processing



                         Compare
 Stored in database                       Image
                         to
                                          Processing
                         Database




            Authorized              Refused
PROBLEM STATEMENT
 Some outside people enter the KIST gates using stolen or
  borrowed students cards.



 Some times, students miss classes when cards
  forgotten, lost or stolen.
PROCESS
 This project will proceed successive
  stages following the modified waterfall
  model. Each step starts when the previous
  is finished
 It is possible to review a finished stage
  and make some modification whenever
  needed.
SOFTWARE PLATFORM
 Operating system (OS) Name: Microsoft    Windows xp
    Professional
   OS version                : 5.1.2600 Service Pack 2
    Build 2600
   OS Configuration         : Standalone Workstation
   Microsoft visual c++
   Sql server 2005
HARDWARE
   System manufacturer         : Dell Computer Corporation
   Model                         : Latitude D400
   System type                  : X86-based PC

   Processor: [01]: x86 family 6 Model 13 stepping 6 Genuine
    Intel
   1594 MHz
   BIOS version: DELL – 27d40903
   Physical memory: 510 MB
   Virtual Memory: 2048
   Storage: 60 GB
SCOPE OF PROJECT
 This project “Fingerprint recognition for Security” will use
   a sample of hundred (100) fingerprints because of the time
   and resource limitation.

 The system we will develop will be tested on a single
  computer.

 All the activities and researches of this project will take place
  inside KIST using available and accessible resources.
GANTT CHART
LITTERATURE REVIEW
FINGERPRINT
 impression of the friction ridges of all or any part of
  the finger.

 Oldest form of Biometrics


 Highly Reliable


 Uses distinctive features of fingers
FINGERPRINT SCANNER/SENSOR
  A fingerprint
 sensor is an
 electronic device
 used to capture a
 digital image of
 the fingerprint
 pattern.
FINGERPRINT
 impression of the
 friction ridges of all or
 any part of the finger.

 Oldest form of
 Biometrics

 Highly Reliable
APPLICATIONS
 Personal computer / workstation security.
 Network / enterprise security.
 e-commerce / e-business.
 Electronic transactions.
 Physical Access Control (e.g. Airport)
 Information System Security
 National ID Systems
 Identification of Criminals
FLOW CHART
USE CASE DIAGRAM
. THANK YOU FOR
 YOUR ATTENTION

Más contenido relacionado

La actualidad más candente

Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Lakshmi Sarvani Videla
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
Best library turnstiles - Mairsturnstile.com
Best library turnstiles - Mairsturnstile.comBest library turnstiles - Mairsturnstile.com
Best library turnstiles - Mairsturnstile.comwww.mairsturnstile.com
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
Airport turnstile - Mairsturnstile.com
Airport turnstile - Mairsturnstile.comAirport turnstile - Mairsturnstile.com
Airport turnstile - Mairsturnstile.comwww.mairsturnstile.com
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET Journal
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET Journal
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card SecurityPrav_Kalyan
 
Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...
Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...
Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...imec.archive
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGYJOLLUSUDARSHANREDDY
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)Karteek Irukulla
 
Document Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - CopyDocument Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - CopyRima Hajou
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image ProcessingIRJET Journal
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET Journal
 

La actualidad más candente (20)

Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.
 
N044057478
N044057478N044057478
N044057478
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
Finger print recognized atm system
Finger print recognized atm systemFinger print recognized atm system
Finger print recognized atm system
 
000
000000
000
 
Security
SecuritySecurity
Security
 
Bg24375379
Bg24375379Bg24375379
Bg24375379
 
Best library turnstiles - Mairsturnstile.com
Best library turnstiles - Mairsturnstile.comBest library turnstiles - Mairsturnstile.com
Best library turnstiles - Mairsturnstile.com
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
Airport turnstile - Mairsturnstile.com
Airport turnstile - Mairsturnstile.comAirport turnstile - Mairsturnstile.com
Airport turnstile - Mairsturnstile.com
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM Machine
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...
Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...
Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
 
Document Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - CopyDocument Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - Copy
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 

Similar a predefense presentation

Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copyevsrao
 
Sample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginSample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginnaveendurga557
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IRJET Journal
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptxGAMINGRBF
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingIRJET Journal
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDDevOps.com
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical CaptchaSankar Anand
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.SrinivasuluIJCST - ESRG Journals
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14Saddam Ahmed
 
AUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEM
AUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEMAUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEM
AUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEMIRJET Journal
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
Dell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western OntarioDell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western OntarioBill Wong
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCVIRJET Journal
 
Keyloggers A Malicious Attack
Keyloggers A Malicious AttackKeyloggers A Malicious Attack
Keyloggers A Malicious Attackijtsrd
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your TypeCTIN
 

Similar a predefense presentation (20)

Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
 
Sample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginSample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for login
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
best pharma journals
best pharma journals best pharma journals
best pharma journals
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
 
Efficient Securing System Using Graphical Captcha
 Efficient Securing System Using Graphical Captcha Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
 
ITIMP35.pptx
ITIMP35.pptxITIMP35.pptx
ITIMP35.pptx
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
3D Password
3D Password3D Password
3D Password
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
AUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEM
AUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEMAUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEM
AUTOMATIC APPEARANCE MASK AND BODY TEMPERATURE FINDING SYSTEM
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Dell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western OntarioDell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western Ontario
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 
Keyloggers A Malicious Attack
Keyloggers A Malicious AttackKeyloggers A Malicious Attack
Keyloggers A Malicious Attack
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 

predefense presentation

  • 1. PRESENTATION Project Title: “FINGERPRINT RECOGNITION FOR . SECURITY” By BISANGABAGABO Alphonse Registration Number: GS20100516 Supervisor: Dr. NGARAMBE Donart.
  • 2. ABSTRACT Fingerprint recognition refers to the automated method of verifying match between two human fingerprints. This project will study on the use of “Fingerprints” to improve the way student’s identification for security is done within KIST. The algorithm used is based on Fingerprint Scanning, Fingerprint Matching, Identification image. The Project implementation will use C programming language as a programming tool.
  • 3. INTRODUCTION Nowadays, authentication is among the most challenging issues in different sectors of life. The use of ID cards, PINs, Passwords can be forgotten or guessed, cards and badges can get lost, stolen or lent to a friend for the illegal use. The same case can happen in any institution. This project is planned with objective of finding accurate solution to that issue specifically in KIST, where anybody has to identify him/her self to a security guard using card.
  • 4. Introduction Cont’d  The use of Biometrics technology is the solution. A fingerprint was found to have specific characteristics (Minutiae) that are unique to anybody. The advantage of using Fingerprint recognition applications can be summarized into three classes  Easy mode life  Prevent fraud  Control
  • 5. INTRODUCTION Cont’d  The Oldest form of Biometrics  Highly Reliable  Uses distinctive features of fingers  No thief can steal it.  Never forgotten at home.
  • 6. GENERAL OBJECTIVES  To replace token based authentication by biometric recognition methods.  To build automatic and rapid system in order to optimize the authentication check.
  • 7. SPECIFIC OBJECTIVES  To apply new technology in everyday life in the vision of avoiding fraud and security risk of being confused.  To remove students stress in case cards are forgotten or lost.  To reduce task of security guards and let the decision be automatic.
  • 8. EXISTING SYSTEM  In KIST Fingerprint system already exists. It simply monitors the employee’s arrival and/or leave time.  For student identification, cards are presented to a security guard on entrance gates.  The existing system is limited in functionalities, new features need to be added.
  • 9. PROPOSED SYSTEM Fingerprint image Fingerprint image aquisition aquisition image Processing Compare Stored in database Image to Processing Database Authorized Refused
  • 10. PROBLEM STATEMENT  Some outside people enter the KIST gates using stolen or borrowed students cards.  Some times, students miss classes when cards forgotten, lost or stolen.
  • 11. PROCESS  This project will proceed successive stages following the modified waterfall model. Each step starts when the previous is finished  It is possible to review a finished stage and make some modification whenever needed.
  • 12. SOFTWARE PLATFORM  Operating system (OS) Name: Microsoft Windows xp Professional  OS version : 5.1.2600 Service Pack 2 Build 2600  OS Configuration : Standalone Workstation  Microsoft visual c++  Sql server 2005
  • 13. HARDWARE  System manufacturer : Dell Computer Corporation  Model : Latitude D400  System type : X86-based PC   Processor: [01]: x86 family 6 Model 13 stepping 6 Genuine Intel  1594 MHz  BIOS version: DELL – 27d40903  Physical memory: 510 MB  Virtual Memory: 2048  Storage: 60 GB
  • 14. SCOPE OF PROJECT  This project “Fingerprint recognition for Security” will use a sample of hundred (100) fingerprints because of the time and resource limitation.  The system we will develop will be tested on a single computer.  All the activities and researches of this project will take place inside KIST using available and accessible resources.
  • 17. FINGERPRINT  impression of the friction ridges of all or any part of the finger.  Oldest form of Biometrics  Highly Reliable  Uses distinctive features of fingers
  • 18. FINGERPRINT SCANNER/SENSOR A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern.
  • 19. FINGERPRINT  impression of the friction ridges of all or any part of the finger.  Oldest form of Biometrics  Highly Reliable
  • 20. APPLICATIONS  Personal computer / workstation security.  Network / enterprise security.  e-commerce / e-business.  Electronic transactions.  Physical Access Control (e.g. Airport)  Information System Security  National ID Systems  Identification of Criminals
  • 23. . THANK YOU FOR YOUR ATTENTION