31-03-2011, 04:52 PM
[attachment=11449]
PREFACE
Fingerprint identification is one of the most well-known and publicized biometrics. Because of their uniqueness and consistency over time, fingerprints have been used for identification for over a century, more recently becoming automated (i.e. a biometric) due to advancements in computing capabilities. Fingerprint identification is popular because of the inherent ease in acquisition, the numerous sources (ten fingers) available for collection, and their established use and collections by law enforcement and immigration.
In a general sense, fingerprint recognition technologies analyze global pattern schemas along with small unique marks on the fingerprint known as minutiae, which are the ridge endings and bifurcations or branches in the fingerprint ridges. The data that is extracted from fingerprints is extremely dense which explains why fingerprints are an extremely reliable means of personal identification.
There are on average seventy unique, measurable minutiae points in each fingerprint, and each point has seven unique characteristics - more than enough to establish identity. Should we desire an even more foolproof identification schema, because each of our fingerprints is unique, we can use as many as ten fingerprints which yield at least 4900 independent measurable characteristics.
A practical biometric system should meet the specified recognition accuracy, speed, and resource requirements, be harmless to the users, be accepted by the intended population, and be sufficiently robust to various fraudulent methods and attacks to the system.
INTRODUCTION
1.1- Problem Definition
1.2- Existing System
1.3- Limitations And Drawback of Existing system
1.4- The Proposed System
1.5- Features of the Proposed System
1.1- Problem Definition
In today’s world security and genuine attendance system is very necessary in every where. You use these system to restrict the entry of unauthorized person or students and make your premises secure from unauthorized use. Lot’s of offices, schools and colleges introduce the card reader for to make there security system intact. The concept behind card reader is like these:
First of all, one card is issued to the student or person whom you like to give the privilege to enter into your premises or to update the attendance. The card contains one program and a security code. The security code is generated randomly. This security code is compare with the database that we have and if the security code matches with the security code of the card then you can enter the premises. But, this card and the card reader have some problem and it may lead to the any of the penetration of security.
1] First of all, if the person, to whom the card has been issued, can give his card to some other unauthorized person or it may be stolen. Before the reporting to higher authority and before blocking the access of that card one may misuse that card.
2] Card may damage or can cause malfunction and in meantime person can’t enter in to premises where there may be some urgency.
To avoid these stuffs we can use a new gadget can “Fingerprint Reader”. Where the finger print of the authorize person will be taken and store into data storage. Then, at the time of entering the fingerprint of the person will be compared with the fingerprint save in the data storage. This are the more secure and more reliable and expert are thinking that these are the future security application which will replace the card reader.
1.2 Existing System
Keypad and password based Attendance and door access system is widely used in the Industry and companies.
Card based system is also used in various attendance and door access systems.
1.3 Limitations and Drawbacks of Existing system
In keypad and password system if password is leaked than anyone can easily get the attendance or unauthorized access.
In card based security systems, anyone can get the access by stealing anybody’s card.
1.4 The Proposed System
In our system there will be no need to remember any password nor is it required to carry any card for getting the attendance.
The Finger Print of every Individual will be the access key.
We will use a finger print module in our hardware.
Every user has to show is finger print to the finger print Scanner.
The module will match the finger print with already stored print in its memory if matched then access is given to him/her.
Hence the members to be allowed for access should be first Enrolled in finger print module.
1.5 Features of the Proposed System
Scan of entire finger print with dual orientation
Advanced and reliable image processing and encryption.
Finger Print Module will be directly interfaced with the serial port of the PC.
Interfacing the FP module to the PC.
Controlling the serial port of the PC.
Controlling parallel Port of the PC.
SYSTEM OVERVIEW
2.1- Development Stages and Process
2.2- The System Organization and Hierarchy
2.3- Block Diagram
2.4- Brief Explanation
2.5- Data Flow Diagram
2.6- Flow chart
2.1- Development Stages and Process
The complete development of this system can be divided into the following stages
Problem definition stage
Designing block diagram
Implementing circuits and components
Developing flowchart for software
Testing
Running
Documentation
Problem definition stage
This is the very first stage to develop any project. It actually defines the aim and the concept of the project. In this section the purpose i.e. why this particular project is required is explained.
Designing block diagram
At this stage we have categorized the whole system into different individual modules. These modules (block diagrams) will be helpful in understanding the concept and working of the integrated system.
Implementing circuits and components
This is the actual implementation of circuit of each block. At this stage we have actually designed each block separately and finally integrated them into the complete working system.
Developing Flowchart for software
To get the logical flow of the software, the development of flowchart is having a prominent role. So we have to analyze the complete system and organized the flowchart in such a manner that one can understand the complete working of the software.
Testing
This time we tested our project for actual working, after loading the software into the microcontroller. Any errors found were removed successfully.
Running
This is the last and final stage of development of our project. In this stage a user flowchart was made so that any one can use this system without any difficulty.