True Finger Print Based Access Control System
#1

[attachment=11449]
PREFACE
Fingerprint identification is one of the most well-known and publicized biometrics. Because of their uniqueness and consistency over time, fingerprints have been used for identification for over a century, more recently becoming automated (i.e. a biometric) due to advancements in computing capabilities. Fingerprint identification is popular because of the inherent ease in acquisition, the numerous sources (ten fingers) available for collection, and their established use and collections by law enforcement and immigration.
In a general sense, fingerprint recognition technologies analyze global pattern schemas along with small unique marks on the fingerprint known as minutiae, which are the ridge endings and bifurcations or branches in the fingerprint ridges. The data that is extracted from fingerprints is extremely dense which explains why fingerprints are an extremely reliable means of personal identification.
There are on average seventy unique, measurable minutiae points in each fingerprint, and each point has seven unique characteristics - more than enough to establish identity. Should we desire an even more foolproof identification schema, because each of our fingerprints is unique, we can use as many as ten fingerprints which yield at least 4900 independent measurable characteristics.
A practical biometric system should meet the specified recognition accuracy, speed, and resource requirements, be harmless to the users, be accepted by the intended population, and be sufficiently robust to various fraudulent methods and attacks to the system.
INTRODUCTION
1.1- Problem Definition
1.2- Existing System
1.3- Limitations And Drawback of Existing system
1.4- The Proposed System
1.5- Features of the Proposed System
1.1- Problem Definition
In today’s world security and genuine attendance system is very necessary in every where. You use these system to restrict the entry of unauthorized person or students and make your premises secure from unauthorized use. Lot’s of offices, schools and colleges introduce the card reader for to make there security system intact. The concept behind card reader is like these:
First of all, one card is issued to the student or person whom you like to give the privilege to enter into your premises or to update the attendance. The card contains one program and a security code. The security code is generated randomly. This security code is compare with the database that we have and if the security code matches with the security code of the card then you can enter the premises. But, this card and the card reader have some problem and it may lead to the any of the penetration of security.
1] First of all, if the person, to whom the card has been issued, can give his card to some other unauthorized person or it may be stolen. Before the reporting to higher authority and before blocking the access of that card one may misuse that card.
2] Card may damage or can cause malfunction and in meantime person can’t enter in to premises where there may be some urgency.
To avoid these stuffs we can use a new gadget can “Fingerprint Reader”. Where the finger print of the authorize person will be taken and store into data storage. Then, at the time of entering the fingerprint of the person will be compared with the fingerprint save in the data storage. This are the more secure and more reliable and expert are thinking that these are the future security application which will replace the card reader.
1.2 Existing System
 Keypad and password based Attendance and door access system is widely used in the Industry and companies.
 Card based system is also used in various attendance and door access systems.
1.3 Limitations and Drawbacks of Existing system
 In keypad and password system if password is leaked than anyone can easily get the attendance or unauthorized access.
 In card based security systems, anyone can get the access by stealing anybody’s card.
1.4 The Proposed System
 In our system there will be no need to remember any password nor is it required to carry any card for getting the attendance.
 The Finger Print of every Individual will be the access key.
 We will use a finger print module in our hardware.
 Every user has to show is finger print to the finger print Scanner.
 The module will match the finger print with already stored print in its memory if matched then access is given to him/her.
 Hence the members to be allowed for access should be first Enrolled in finger print module.
1.5 Features of the Proposed System
 Scan of entire finger print with dual orientation
 Advanced and reliable image processing and encryption.
 Finger Print Module will be directly interfaced with the serial port of the PC.
 Interfacing the FP module to the PC.
 Controlling the serial port of the PC.
 Controlling parallel Port of the PC.
SYSTEM OVERVIEW
2.1- Development Stages and Process
2.2- The System Organization and Hierarchy
2.3- Block Diagram
2.4- Brief Explanation
2.5- Data Flow Diagram
2.6- Flow chart
2.1- Development Stages and Process
The complete development of this system can be divided into the following stages
 Problem definition stage
 Designing block diagram
 Implementing circuits and components
 Developing flowchart for software
 Testing
 Running
 Documentation
Problem definition stage
This is the very first stage to develop any project. It actually defines the aim and the concept of the project. In this section the purpose i.e. why this particular project is required is explained.
Designing block diagram
At this stage we have categorized the whole system into different individual modules. These modules (block diagrams) will be helpful in understanding the concept and working of the integrated system.
Implementing circuits and components
This is the actual implementation of circuit of each block. At this stage we have actually designed each block separately and finally integrated them into the complete working system.
Developing Flowchart for software
To get the logical flow of the software, the development of flowchart is having a prominent role. So we have to analyze the complete system and organized the flowchart in such a manner that one can understand the complete working of the software.
Testing
This time we tested our project for actual working, after loading the software into the microcontroller. Any errors found were removed successfully.
Running
This is the last and final stage of development of our project. In this stage a user flowchart was made so that any one can use this system without any difficulty.
Reply
#2

to get information about the topic fingerprint based projects full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-finger-prin...ull-report

http://studentbank.in/report-finger-prin...ull-report

http://studentbank.in/report-fingerprint...ity-system

http://studentbank.in/report-fingerprint...8#pid64168

http://studentbank.in/report-biometric-f...nce-system

http://studentbank.in/report-true-finger...rol-system
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: is project x a true story australia, ppts of finger print based vehicle access control system, access control system rfid, true education, ppt based on finger print based access control system, true education solutions, ppt on finger print access control system,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,045 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Critical State-Based Filtering System for Securing SCADA Network Protocols 1 838 14-02-2017, 12:48 PM
Last Post: jaseela123d
  ATM access control using fingerprint scanning smart paper boy 8 5,680 01-07-2016, 11:42 AM
Last Post: jaseela123d
  Content-based image retrieval (CBIR) System project topics 15 13,653 13-05-2016, 02:30 PM
Last Post: dhanabhagya
  Development of a workflow based Complaint Management System (where the complaints are mechanical engineering crazy 5 5,592 28-08-2015, 04:59 AM
Last Post: AlbertFak
  Web Based Blood Bank Management System project report maker 4 12,585 18-04-2015, 07:12 PM
Last Post: Guest
  MOBILE PHONE BASED ATTENDANCE TRACKING SYSTEM seminarsonly 25 20,833 06-03-2015, 07:18 PM
Last Post: unas
  Adaptive Forwarding Delay Control for VANET Data Aggregation Projects9 2 1,702 18-03-2014, 11:25 PM
Last Post: seminar report asees
  RATIONSHOP INVENTORY CONTROL SYSTEM full report smart paper boy 5 5,720 04-10-2013, 05:33 AM
Last Post: harish pr
  Intelligent system for Gas, Human detection and Temperature Monitor control using GSM seminar surveyer 3 3,414 17-04-2013, 11:37 PM
Last Post: [email protected]

Forum Jump: