0% found this document useful (0 votes)
60 views17 pages

Report Template

This document appears to be a student's mini project report submitted for their Bachelor's degree. It includes the standard components of a project report such as a title page with the student's name and roll number, a bonafide certificate signed by department heads confirming the work is the student's own, an acknowledgements section thanking those who helped with the project, and an abstract summarizing the project. The introduction provides background on security systems and biometrics, noting advantages of biometrics like security, convenience and being unique to an individual. It also describes different types of biometrics used for identification like iris scanning, facial recognition and fingerprint recognition.

Uploaded by

YOKESH B
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views17 pages

Report Template

This document appears to be a student's mini project report submitted for their Bachelor's degree. It includes the standard components of a project report such as a title page with the student's name and roll number, a bonafide certificate signed by department heads confirming the work is the student's own, an acknowledgements section thanking those who helped with the project, and an abstract summarizing the project. The introduction provides background on security systems and biometrics, noting advantages of biometrics like security, convenience and being unique to an individual. It also describes different types of biometrics used for identification like iris scanning, facial recognition and fingerprint recognition.

Uploaded by

YOKESH B
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 17

TITLE OF MINI PROJECT

MINI PROJECT

Submitted by

STUDENT NAME ROLL NO

in partial fulfilment for the award of the degree

of

BACHELOR OF ENGINEERING
in

DEPARTMENT NAME

Dr. MAHALINGAM COLLEGE OF


ENGINEERING AND
TECHNOLOGY
An Autonomous Institution
Affiliated to ANNA
UNIVERSITY CHENNAI - 600
025
MONTH-2021
i
Dr. MAHALINGAM COLLEGE OF ENGINEERING AND
TECHNOLOGY, POLLACHI -642 003

(An Autonomous Institution Affiliated to Anna University, Chennai - 600 025)

BONAFIDE CERTIFICATE
Certified that this Mini project report titled “ ”
is the bonafide work of

STUDENT NAME ROLL NO

who carried out the mini project under my supervision.

HEAD OF THE DEPARTMENT SUPERVISOR


Department of Department of
Dr.Mahalingam college of y Dr.Mahalingam college of
Engineering and Technology Engineering and Technology
Pollachi- 642003 Pollachi- 642003

Submitted for the Autonomous End Semester Mini project Examination held on

INTERNAL EXAMINER 1 INTERNAL EXAMINER 2

ii
ACKNOWLEDGEME
NT

We wish to express our sincere thanks to all who have contributed to do


this project through their support, encouragement and guidance.

We extend our gratitude to our management for having provided us with


all facilities to build my project successfully. We express our sincere thanks to
our honourable Secretary, Dr.C.Ramaswamy, M.E., Ph.D., F.I.V., for
providing the required amenities.

We take this opportunity to express our deepest gratitude to our principal


Dr.P.Govindhasamy, M.Tech., Ph.D., who provide suitable environment to
carry out the project.

We express our extreme gratefulness to Dr.R.Sudhakar, M.E., Ph.D.,


Professor and Head of the department of Electronics and Communication
Engineering, for his constant support and encouragement.

We wish to express our deep sense of gratitude and thankfulness to my


project guide _______., for the valuable suggestion and guidance offered during
the course of the project.

Finally, we are committed to place our heartfelt thanks to all those who
had contributed directly and indirectly towards the success of the completion of
this project.

iii
ABSTRACT
The ear biometric has received much attention for human recognition due to its unique change
and rich local features. However, extracting discriminative features from ear images is a crucial
task in presence of illumination changes, low contrast, noise and pose variations . With the aim
of neutralizing the effect of these factors , this paper proposes an automatic enhancement
technique to enhance the ear images.The system requires multiple ear image samples to
train.Inputs are given in the form of ear images. Firstly the system would convert the image into
grayscale image for further processes that are involved.Secondly, it will look out for the ROI
which will be extracted from the image which was converted into grayscale.Once the ROI is
extracted the ROI will be sent for enhancement process.Here the ROI image will be enhanced
so it can be used for feature extraction.Features of the ear images will be collected after the
enhancement process is done. Next the features are stored in a data base .All the procedures
mentioned above will be taking place in the offine phase.As for the online phase, the procedure
is followed except for the database a classifier is used to analyse the ear images that are given
as input for the onlinephase.Here the images will be verified by the classifier so it can generate
the necessary outputs.In order for the classfier to identify the earimages , it must be trained with
several modals so it can understand and differentiate the odd images from the existing images in
the database.Once the classifier is trained , images can be sent and it will generate the required
results.Based on the output displayed ,it will be easy to understand that the given input image is
authenticated or unauthenticated.

iv
INTRODUCTION

Security system is any of various means or devices designed to guard persons and property
against a broad range of hazards, including crime, fire, accidents, espionage, sabotage,
subversion, and attack etc.Conventional security systems in existence include pattern
recognition, pincode,number lock,password etc,.However , they do not provide the expected
level of security that is currently needed in the modern days.These systems can be easily
accessed if the key information was obtained by someone other than the user make it
vulnerable.

biometrics are linked to a single individual (unlike a password, which can be used without
authorisation), They are very convenient since there is no need to remember or carry anything,
The security, they are highly fraud resistant. High security and assurance – Biometric
identification provides the answers to “something a person has and is” and helps verify identity.
User Experience – Convenient and fast. Non-transferrable – Everyone has access to a unique set
of biometrics. Spoof-proof – Biometrics are hard to fake or steal.

Nowadays, the need for biometric systems that are capable to reliably recognize persons is quite
ostensible. Emerging applications of biometrics include self-driving, smartphone security,
prevention of human traficking, e-voting,crime,security, investigation, etc. Moreover, with the
development of smart cities, cloud and mobile computing, biometric systems have become
increasingly demanded. For instance, biometrics can be used to enhance the quality of service
in a smart city. Typical examples include ubiquitous healthcare, privacy protection, access
control, screening, traveling facilitation and law enforcement (Barra et al. 2018). In order to
perform identifcation, diferent physiological and behavioural traits including face, iris, ear, gait
and signature can be utilized. Each of these traits should satisfy certain constraints in order to be
eligible for identifcation tasks. The main constraints are measurability, permanence,
uniqueness, universality and collectability.

TYPES OF BIOMETRIC

1.Iris
Iris scanning measures the unique patterns in irises, the colored circles in people’s eyes.
Biometric iris recognition scanners work by illuminating the iris with invisible infrared light to
pick up unique patterns that are not visible to the naked eye. Iris scanners detect and exclude
eyelashes, eyelids, and specular reflections that typically block parts of the iris. The final result
is a set of pixels containing only the iris. Next, the pattern of the eye’s lines and colors are
analyzed to extract a bit pattern that encodes the information in the iris. This bit pattern is
digitized and compared to stored templates in a database for verification (one-to-one template
matching) or identification (one-to-many template matching).

v
2.Face Recognition
Facial recognition is a way of identifying or confirming an individual’s identity using their face.
Facial recognition systems can be used to identify people in photos, videos, or in real-
time.Facial recognition is a category of biometric security. Facial technology systems can vary,
but in general, they tend to operate as follows:

Step 1: Face detection


The camera detects and locates the image of a face, either alone or in a crowd. The image may
show the person looking straight ahead or in profile.

Step 2: Face analysis


Next, an image of the face is captured and analyzed. Most facial recognition technology relies
on 2D rather than 3D images because it can more conveniently match a 2D image with public
photos or those in a database. The software reads the geometry of your face. Key factors
include the distance between your eyes, the depth of your eye sockets, the distance from
forehead to chin, the shape of your cheekbones, and the contour of the lips, ears, and chin. The
aim is to identify the facial landmarks that are key to distinguishing your face.

Step 3: Converting the image to data


The face capture process transforms analog information (a face) into a set of digital information
(data) based on the person's facial features. Your face's analysis is essentially turned into a
mathematical formula. The numerical code is called a faceprint. In the same way that
thumbprints are unique, each person has their own faceprint.

Step 4: Finding a match


Your faceprint is then compared against a database of other known faces. For example, the FBI
has access to up to 650 million photos, drawn from various state databases. On Facebook, any
photo tagged with a person’s name becomes a part of Facebook's database, which may also be
used for facial recognition. If your faceprint matches an image in a facial recognition database,
then a determination is made.

Of all the biometric measurements, facial recognition is considered the most natural. Intuitively,
this makes sense, since we typically recognize ourselves and others by looking at faces, rather
than thumbprints and irises. It is estimated that over half of the world's population is touched by
facial recognition technology regularly.

3.Fingerprint recognition
Fingerprint recognition works by scanning the ridges and valleys of a finger and comparing
them with stored data .The system uses distinct points, called minutiae,where ridges and
valleys end or meet , for comparision.The system can recognize a person by his fingerprint for
identification and verification purpose.

vi
3.Password system
A Password is a word, phrase, or string of characters intended to differentiate an authorized user
or process (for the purpose of permitting access) from an unauthorized user, or put another way,
a password is used to prove one's identity, or authorize access to a resource.

4.Pattern recognition
Pattern Recognition is the method of identifying and distinguishing the patterns, from the
images that are fed as input, and the output is obtained in the form of patterns. There are five
different phases in pattern recognition, such as sensing, segmentation, feature extraction,
classification and post-processing. With the help of these phases, pattern recognition can be
done on any type of input like image recognition, biometric recognition, facial recognition,
colours and shapes, recuperating patterns from distorted inputs, etc.

5.Ear recognition
In recent years, ear has attracted considerable and growing interest in biometric community due
to its inherent characteristics compared to other traits. Unlike face, ear is insusceptible to facial
expressions, emotions, glasses, makeup and it keeps unchanged from 8 to 70 years old (Kamboj
et al. 2021). Nowadays, with outbreak of COVID-19, people wearing masks for prevention
purposes. Hence, it is very challenging for face identifcation systems to recognize persons.
Additionally, ear is a non-intrusive trait because it can typically be acquired without informing
the concerned person. Another appealing property of the ear is its high distinctiveness even in
the case of identical twins.

vii
viii
TABLE OF CONTENTS

CHAPTER TITLE PAGE

NO. NO.

ABSTRACT iii

LIST OF FIGURES ix

LIST OF TABLES xii

LIST OF ABBREVIATIONS xiii

1 INTRODUCTION 1

1.1 HISTORY OF ANTENNA 1

1.2 TYPES OF ANTENNA 2

1.2.1 Isotropic antenna 2

ix
1.2.2 Monopole antenna 2

x
2 LITERATURE SURVEY 14

2.1 INTRODUCTION 14

3 PROBLEM STATEMENT 19

3.1 INTRODUCTION 19

3.2 FEATURES OF ADS 19


4
OBJECTIVE OF THE PROJECT
5
BLOCK DIAGRAM
6
TOOLS USED
7
METHODOLOGY
8
RESULTS and DISCUSSION
9
CONCLUSION & FUTURE SCOPE

REFERENCES

xi
LIST OF FIGURES

FIGURE TITLE PAGE

NO. NO.

1.1 ISOTROPIC ANTENNA 2

1.2 MONOPOLE ANTENNA 3

1.3 DIPOLE ANTENNA 3

1.4 HELICAL ANTENNA 4

1.5 LOOP ANTENNA 4

1.6 GEOMETRY OF MICROSTRIP PATCH 5


ANTENNA

ix
x
LIST OF TABLES

TABLE TITLE PAGE


NO. NO.

4.1 SUBSTRATE 25
SPECIFICATION

4.2 ANTENNA WITH THE GROUND 26


SLOT DIMENSIONS(mm)

4.3 ANTENNA WITH STAIR 28


STEP SLOTS AT PATCH
DIMENSIONS(mm)

xi
LIST OF ABBREVIATIONS

ADS ADVANCED DESIGN SYSTEM

dB DECIBEL

GHZ GIGA HERTZ

MSPA MICROSTRIP PATCH ANTENNA

RF RADIO FREQUENCY

VSWR VOLTAGE STANDING WAVE RATIO

UWB ULTRA WIDE BAND

xii
1. INTRODUCTION

2. LITERATURE SURVEY

3. PROBLEM STATEMENT

4. OBJECTIVE OF THE PROJECT

13
5. PROPOSED BLOCK DIAGRAM

6. TOOLS USED

6.1 HARDWARE DETAILS (Where applicable)

6.2 SOFTWARE DESCRIPTION (Where applicable)

7. METHODOLOGY

8. RESULTS AND DISCUSSION

9. CONCLUSION & FUTURE SCOPE

REFERENCES

[1] Shikha Sukhija, R.K. Sarin “Design and performance of two-sleeve low profile
antenna forbio-medical applications” Journal of Electrical Systems and Information
Technology, Vol 04, 2017.

14

You might also like