predefense presentation
TRANSCRIPT
PRESENTATION
Project Title:
“FINGERPRINT RECOGNITION FOR . SECURITY”
By BISANGABAGABO Alphonse
Registration Number: GS20100516
Supervisor: Dr. NGARAMBE Donart.
ABSTRACT Fingerprint recognition refers to the automated
method of verifying match between two human fingerprints. This project will study on the use of “Fingerprints” to improve the way student’s identification for security is done within KIST. The algorithm used is based on Fingerprint Scanning, Fingerprint Matching, Identification image. The Project implementation will use C programming language as a programming tool.
INTRODUCTION Nowadays, authentication is among the most
challenging issues in different sectors of life. The use of ID cards, PINs, Passwords can be forgotten or guessed, cards and badges can get lost, stolen or lent to a friend for the illegal use. The same case can happen in any institution. This project is planned with objective of finding accurate solution to that issue specifically in KIST, where anybody has to identify him/her self to a security guard using card.
Introduction Cont’d
The use of Biometrics technology is the solution. A fingerprint was found to have specific characteristics (Minutiae) that are unique to anybody. The advantage of using Fingerprint recognition applications can be summarized into three classes
Easy mode lifePrevent fraudControl
INTRODUCTION Cont’d The Oldest form of Biometrics
Highly Reliable
Uses distinctive features of fingers
No thief can steal it.
Never forgotten at home.
GENERAL OBJECTIVES
To replace token based authentication by biometric recognition methods.
To build automatic and rapid system in order to optimize the authentication check.
SPECIFIC OBJECTIVES
To apply new technology in everyday life in the vision of avoiding fraud and security risk of being confused.
To remove students stress in case cards are forgotten or lost.
To reduce task of security guards and let the decision be automatic.
EXISTING SYSTEMIn KIST Fingerprint system already exists. It simply
monitors the employee’s arrival and/or leave time.
For student identification, cards are presented to a security guard on entrance gates.
The existing system is limited in functionalities, new features need to be added.
PROPOSED SYSTEM
Fingerprint image aquisition
Authorized
image Processing
Stored in database
Refused
Compare to Database
Image Processing
Fingerprint image aquisition
PROBLEM STATEMENTSome outside people enter the KIST gates using stolen or
borrowed students cards.
Some times, students miss classes when cards forgotten, lost or stolen.
PROCESS
This project will proceed successive stages following the modified waterfall model. Each step starts when the previous is finished
It is possible to review a finished stage and make some modification whenever needed.
SOFTWARE PLATFORMOperating system (OS) Name: Microsoft Windows xp
ProfessionalOS version : 5.1.2600 Service Pack 2
Build 2600 OS Configuration : Standalone WorkstationMicrosoft visual c++Sql server 2005
HARDWARESystem manufacturer : Dell Computer
CorporationModel : Latitude D400System type : X86-based PC Processor: [01]: x86 family 6 Model 13 stepping 6
Genuine Intel1594 MHz BIOS version: DELL – 27d40903Physical memory: 510 MBVirtual Memory: 2048Storage: 60 GB
SCOPE OF PROJECTThis project “Fingerprint recognition for Security” will use a sample of hundred (100) fingerprints because of the time and resource limitation.
The system we will develop will be tested on a single computer.
All the activities and researches of this project will take place inside KIST using available and accessible resources.
GANTT CHART
LITTERATURE REVIEW
FINGERPRINT
impression of the friction ridges of all or any part of the finger.
Oldest form of Biometrics
Highly Reliable
Uses distinctive features of fingers
FINGERPRINT SCANNER/SENSOR A fingerprint
sensor is an electronic device used to capture a digital image of the fingerprint pattern.
FINGERPRINT
impression of the friction ridges of all or any part of the finger.
Oldest form of Biometrics
Highly Reliable
APPLICATIONSPersonal computer / workstation security.Network / enterprise security. e-commerce / e-business. Electronic transactions. Physical Access Control (e.g. Airport)Information System SecurityNational ID SystemsIdentification of Criminals
FLOW CHART
USE CASE DIAGRAM
. THANK YOU FOR YOUR ATTENTION