Biometric Authentication Using Fingerprint Recognition: Rajiv Gandhi Institute of Technology
Biometric Authentication Using Fingerprint Recognition: Rajiv Gandhi Institute of Technology
Bachelor of Engineering
in
Electronics and Telecommunication
By
Group No: 17
2010-2011
1
1 Abstract
Security is becoming increasingly important in many facets of society, ranging from military,
corporate world, and personal lives. One area of technology that is seeing growth is that of
biometric authentication where a user is granted access to a piece of data, room, etc. via some
form of biometric authentication.Biometrics offer automated methods of identity verification or
identification on the principle of measurable physiological or behavioral characteristics such as
a fingerprint. The characteristics are measurable and unique. Due to the increasing need for
securing data and places, the biometric authentication industry is seeing large market growth.
Hence we decided to build a scalable, small, and efficient device that can be used to secure
doorways throughout a complex.
This project produces a system that captures a user’s fingerprint and then authenticates it
against a database via Ethernet communication; authentication results are displayed via two
color LED’s.
We use keypad to log name and to perform read, save and delete operations. We use a Fingerprint
Cards capacitance based fingerprint scanner as our capturing device. This data is captured
through use of an PIC 16 microcontroller and stored on external SRAM while being sent through
the microcontrollers USART serial port into a serial to Ethernet converter to a server computer.
This computer then performs the filtering and authentication and sends the result back over
Ethernet to the microcontroller.
2 Introduction
Fingerprint-based identification is one of the most important biometric technologies which has
drawn a substantial amount of attention recently. Humans have used fingerprints for personal
identification for centuries and the validity of fingerprint identification has been well established.
In fact, fingerprint technology is so common in personal identification that it has almost become
the synonym of biometrics. Fingerprints are believed to be unique across individuals and across
fingers of same individual. Even identical twins having similar DNA, are believed to have differ-
ent fingerprints. These observations have led to the increased use of automatic fingerprintbased
identification in both civilian and law-enforcement applications.
A fingerprint is comprised of ridges and valleys. The ridges are the dark area of the fingerprint
and the valleys are the white area that exists between the ridges. Many classifications are given
to patterns that can arise in the ridges . These points are also known as the minutiae of the
fingerprint. The most commonly used minutiae in current fingerprint recognition technologies
are ridge endings and bifurcations because they can be easily detected by only looking at points
that surround them.
2
3 Literature Survey
As one of the most successful applications of image analysis and understanding, fingerprint recog-
nition has recently received significant attention, especially during past several years.When we
were searching some ideas for BE project ,we came across one of research papers of Raymond
Thai a renowned auther for books on fingerprint matching algorithms. We found this field very
interesting and challenging as it involves designing new innovative algorithms for fingerprint
matching.
So we searched more on this topic and found some abstracts, technical matter on different
websites like www.electronics foryou.com, official website of Cornell University.
We found some ideas regarding new algorithms , block diagram for this project from internet.
We also referred a paper on fingerprint recognition using minutia score matching written by K
B Raja and Venugopal K R which gave us good idea about the process of matching.
3
4 Block diagram
4
4.3 Step One - Feature Enhancement:
Normalization: In this step we take the input image and divide it up into N x N squares.
In each square we find the mean and variance. We then normalize the image according to our
preferred mean and variance (100 and 100 respectively).
Gabor Filtering: Gabor filters can best be thought of as a direction filter that when the
orientation of the gabor filter is perpendicular to that of the ridge orientation the image is
enhanced along that direction. For example, if we applied a gabor filter of orientation directly
in line with ridge orientation, the result would resemble a smudge and have very low variance;
but, if we filtered with a perfectly perpendicular gabor filter the result would be a smoothed
image eliminating most noise.
Threshold Binarization: In each N x N window we take the average pixel value as the
threshold and if a pixel in that windowed image is less than the threshold we assign it a value
of 1 (indicating ridge) or 0 (indicating valley).
Thinning the Image: After we have binarized the image, we perform a thinning algorithm.
5
5 Circuit diagram
6
References
[1] Computational Algorithms for Fingerprint Recognition, Bir Bhanu and Xue-
jun Tan. Kluwer Academic Publishers, 2004.
[3] Fingerprint Matching Using gabor Filters, Muhammad Umer Munir and Dr.
Muhammad Younas Javed, College of Electrical and Mechanical Engienering.
National University of Sciences and Technology