0% found this document useful (0 votes)
319 views7 pages

Biometric Authentication Using Fingerprint Recognition: Rajiv Gandhi Institute of Technology

This project involves developing a biometric authentication system using fingerprint recognition. The system captures a user's fingerprint using a fingerprint scanner and authenticates it against a database stored on a server computer. It then displays the authentication result via two color LEDs. The fingerprint data is captured by a PIC microcontroller and sent over Ethernet to the server. The server performs fingerprint matching through feature extraction, minutiae detection, and minutiae matching algorithms. If a match is found, one LED color lights up, and if no match, the other LED lights up. The system was designed to provide secure access control for doorways using low-cost and scalable fingerprint authentication.

Uploaded by

Sarvesh Desai
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
319 views7 pages

Biometric Authentication Using Fingerprint Recognition: Rajiv Gandhi Institute of Technology

This project involves developing a biometric authentication system using fingerprint recognition. The system captures a user's fingerprint using a fingerprint scanner and authenticates it against a database stored on a server computer. It then displays the authentication result via two color LEDs. The fingerprint data is captured by a PIC microcontroller and sent over Ethernet to the server. The server performs fingerprint matching through feature extraction, minutiae detection, and minutiae matching algorithms. If a match is found, one LED color lights up, and if no match, the other LED lights up. The system was designed to provide secure access control for doorways using low-cost and scalable fingerprint authentication.

Uploaded by

Sarvesh Desai
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Synopsis of the project

BIOMETRIC AUTHENTICATION USING


FINGERPRINT RECOGNITION

to be submitted to Mumbai University, Mumbai for the award of the degree of

Bachelor of Engineering
in
Electronics and Telecommunication

By

Group No: 17

Sarvesh Desai .... 711


Jitendra Naik .... 735
Girish Patil .... 739

Guide : Prof. P.N.Sonar

Manjra Charitable Trust’s


RAJIV GANDHI INSTITUTE OF TECHNOLOGY
Juhu Versova Link Road,Versova,Andheri(w),Mumbai-53.

2010-2011

1
1 Abstract
Security is becoming increasingly important in many facets of society, ranging from military,
corporate world, and personal lives. One area of technology that is seeing growth is that of
biometric authentication where a user is granted access to a piece of data, room, etc. via some
form of biometric authentication.Biometrics offer automated methods of identity verification or
identification on the principle of measurable physiological or behavioral characteristics such as
a fingerprint. The characteristics are measurable and unique. Due to the increasing need for
securing data and places, the biometric authentication industry is seeing large market growth.
Hence we decided to build a scalable, small, and efficient device that can be used to secure
doorways throughout a complex.
This project produces a system that captures a user’s fingerprint and then authenticates it
against a database via Ethernet communication; authentication results are displayed via two
color LED’s.
We use keypad to log name and to perform read, save and delete operations. We use a Fingerprint
Cards capacitance based fingerprint scanner as our capturing device. This data is captured
through use of an PIC 16 microcontroller and stored on external SRAM while being sent through
the microcontrollers USART serial port into a serial to Ethernet converter to a server computer.
This computer then performs the filtering and authentication and sends the result back over
Ethernet to the microcontroller.

2 Introduction
Fingerprint-based identification is one of the most important biometric technologies which has
drawn a substantial amount of attention recently. Humans have used fingerprints for personal
identification for centuries and the validity of fingerprint identification has been well established.
In fact, fingerprint technology is so common in personal identification that it has almost become
the synonym of biometrics. Fingerprints are believed to be unique across individuals and across
fingers of same individual. Even identical twins having similar DNA, are believed to have differ-
ent fingerprints. These observations have led to the increased use of automatic fingerprintbased
identification in both civilian and law-enforcement applications.
A fingerprint is comprised of ridges and valleys. The ridges are the dark area of the fingerprint
and the valleys are the white area that exists between the ridges. Many classifications are given
to patterns that can arise in the ridges . These points are also known as the minutiae of the
fingerprint. The most commonly used minutiae in current fingerprint recognition technologies
are ridge endings and bifurcations because they can be easily detected by only looking at points
that surround them.

2
3 Literature Survey
As one of the most successful applications of image analysis and understanding, fingerprint recog-
nition has recently received significant attention, especially during past several years.When we
were searching some ideas for BE project ,we came across one of research papers of Raymond
Thai a renowned auther for books on fingerprint matching algorithms. We found this field very
interesting and challenging as it involves designing new innovative algorithms for fingerprint
matching.

So we searched more on this topic and found some abstracts, technical matter on different
websites like www.electronics foryou.com, official website of Cornell University.

We found some ideas regarding new algorithms , block diagram for this project from internet.
We also referred a paper on fingerprint recognition using minutia score matching written by K
B Raja and Venugopal K R which gave us good idea about the process of matching.

3
4 Block diagram

4.1 Fingerprint Capturing:


To capture the fingerprint image we set the microcontroller to wait for an available character in
USART. When a character becomes available, it reads it, and if it is equal to ’G’ then it starts
the image capturing.We then read in the stream from the fingerprint reader and simultaneously
store the data point in SRAM and add it to the Ethernet packet for later transmission.The
result of the matching is then outputted on the LED’s.Once all 30400 bytes have been sent, the
microcontroller returns to waiting for another read.

4.2 Fingerprint Verification:


There are basically three steps to matching one fingerprint against a reference fingerprint in a
databaseThe first step is to perform the filtering on the input fingerprint in which the goal is
to enhance all features and end up with a skeleton image of the original fingerprint. Step two
is to take this skeleton image and find as many legitimate minutiae (ridges and bifurcations) as
possible.The last step is to compare the legitimate minutiae that were just found against the
reference minutiae in the database and output the result (true or false) of the comparison.

4
4.3 Step One - Feature Enhancement:
Normalization: In this step we take the input image and divide it up into N x N squares.
In each square we find the mean and variance. We then normalize the image according to our
preferred mean and variance (100 and 100 respectively).
Gabor Filtering: Gabor filters can best be thought of as a direction filter that when the
orientation of the gabor filter is perpendicular to that of the ridge orientation the image is
enhanced along that direction. For example, if we applied a gabor filter of orientation directly
in line with ridge orientation, the result would resemble a smudge and have very low variance;
but, if we filtered with a perfectly perpendicular gabor filter the result would be a smoothed
image eliminating most noise.
Threshold Binarization: In each N x N window we take the average pixel value as the
threshold and if a pixel in that windowed image is less than the threshold we assign it a value
of 1 (indicating ridge) or 0 (indicating valley).
Thinning the Image: After we have binarized the image, we perform a thinning algorithm.

4.4 Step Two - Minutiae Extraction:


In this project we distinguish a minutiae as one of two types, a ridge ending or a bifurcation.
We use a window of 3 x 3 to scan across the thinned image to compute a crossing number.
Depending on the value of the crossing number it identifies a point as either a ridge ending, a
bifurcation, or as nothing.After minutiae are identified as being possibly legitimate we attempt
to delete all of the spurious minutiae.

4.5 Step Three - Minutiae Comparison:


Minutiae comparison is one of the most heavily researched areas of fingerprint matching. The
first step in the algorithm is to establish what information we need about the minutiae and
create a structure that stores all the relevant information. We need x,y coordinates , type of
minutiae, and minutiae angle. The minutiae angle is the angle the minutiae makes w.r.t to the
ridge it lies on.For efficient matching process,extracted data is stored in matrix format.
No. of rows= No of minutiae points
No of column= 4
column 1= row index of each minutiae point
column 2= column index of each minutiae point
column 3= orientation angle of each minutiae point
column 4= type of minutia

5
5 Circuit diagram

6
References
[1] Computational Algorithms for Fingerprint Recognition, Bir Bhanu and Xue-
jun Tan. Kluwer Academic Publishers, 2004.

[2] Fingerprint Image Enhancement and Minutiae Extraction, Nimitha Chama.


Department of Electrical and Computer Engineering - Clemson University .

[3] Fingerprint Matching Using gabor Filters, Muhammad Umer Munir and Dr.
Muhammad Younas Javed, College of Electrical and Mechanical Engienering.
National University of Sciences and Technology

[4] Fingerprint Image Enhancement and Minutiae Extraction, Raymond Thai

You might also like