Report Template
Report Template
MINI PROJECT
Submitted by
of
BACHELOR OF ENGINEERING
in
DEPARTMENT NAME
BONAFIDE CERTIFICATE
Certified that this Mini project report titled “ ”
is the bonafide work of
Submitted for the Autonomous End Semester Mini project Examination held on
ii
ACKNOWLEDGEME
NT
Finally, we are committed to place our heartfelt thanks to all those who
had contributed directly and indirectly towards the success of the completion of
this project.
iii
ABSTRACT
The ear biometric has received much attention for human recognition due to its unique change
and rich local features. However, extracting discriminative features from ear images is a crucial
task in presence of illumination changes, low contrast, noise and pose variations . With the aim
of neutralizing the effect of these factors , this paper proposes an automatic enhancement
technique to enhance the ear images.The system requires multiple ear image samples to
train.Inputs are given in the form of ear images. Firstly the system would convert the image into
grayscale image for further processes that are involved.Secondly, it will look out for the ROI
which will be extracted from the image which was converted into grayscale.Once the ROI is
extracted the ROI will be sent for enhancement process.Here the ROI image will be enhanced
so it can be used for feature extraction.Features of the ear images will be collected after the
enhancement process is done. Next the features are stored in a data base .All the procedures
mentioned above will be taking place in the offine phase.As for the online phase, the procedure
is followed except for the database a classifier is used to analyse the ear images that are given
as input for the onlinephase.Here the images will be verified by the classifier so it can generate
the necessary outputs.In order for the classfier to identify the earimages , it must be trained with
several modals so it can understand and differentiate the odd images from the existing images in
the database.Once the classifier is trained , images can be sent and it will generate the required
results.Based on the output displayed ,it will be easy to understand that the given input image is
authenticated or unauthenticated.
iv
INTRODUCTION
Security system is any of various means or devices designed to guard persons and property
against a broad range of hazards, including crime, fire, accidents, espionage, sabotage,
subversion, and attack etc.Conventional security systems in existence include pattern
recognition, pincode,number lock,password etc,.However , they do not provide the expected
level of security that is currently needed in the modern days.These systems can be easily
accessed if the key information was obtained by someone other than the user make it
vulnerable.
biometrics are linked to a single individual (unlike a password, which can be used without
authorisation), They are very convenient since there is no need to remember or carry anything,
The security, they are highly fraud resistant. High security and assurance – Biometric
identification provides the answers to “something a person has and is” and helps verify identity.
User Experience – Convenient and fast. Non-transferrable – Everyone has access to a unique set
of biometrics. Spoof-proof – Biometrics are hard to fake or steal.
Nowadays, the need for biometric systems that are capable to reliably recognize persons is quite
ostensible. Emerging applications of biometrics include self-driving, smartphone security,
prevention of human traficking, e-voting,crime,security, investigation, etc. Moreover, with the
development of smart cities, cloud and mobile computing, biometric systems have become
increasingly demanded. For instance, biometrics can be used to enhance the quality of service
in a smart city. Typical examples include ubiquitous healthcare, privacy protection, access
control, screening, traveling facilitation and law enforcement (Barra et al. 2018). In order to
perform identifcation, diferent physiological and behavioural traits including face, iris, ear, gait
and signature can be utilized. Each of these traits should satisfy certain constraints in order to be
eligible for identifcation tasks. The main constraints are measurability, permanence,
uniqueness, universality and collectability.
TYPES OF BIOMETRIC
1.Iris
Iris scanning measures the unique patterns in irises, the colored circles in people’s eyes.
Biometric iris recognition scanners work by illuminating the iris with invisible infrared light to
pick up unique patterns that are not visible to the naked eye. Iris scanners detect and exclude
eyelashes, eyelids, and specular reflections that typically block parts of the iris. The final result
is a set of pixels containing only the iris. Next, the pattern of the eye’s lines and colors are
analyzed to extract a bit pattern that encodes the information in the iris. This bit pattern is
digitized and compared to stored templates in a database for verification (one-to-one template
matching) or identification (one-to-many template matching).
v
2.Face Recognition
Facial recognition is a way of identifying or confirming an individual’s identity using their face.
Facial recognition systems can be used to identify people in photos, videos, or in real-
time.Facial recognition is a category of biometric security. Facial technology systems can vary,
but in general, they tend to operate as follows:
Of all the biometric measurements, facial recognition is considered the most natural. Intuitively,
this makes sense, since we typically recognize ourselves and others by looking at faces, rather
than thumbprints and irises. It is estimated that over half of the world's population is touched by
facial recognition technology regularly.
3.Fingerprint recognition
Fingerprint recognition works by scanning the ridges and valleys of a finger and comparing
them with stored data .The system uses distinct points, called minutiae,where ridges and
valleys end or meet , for comparision.The system can recognize a person by his fingerprint for
identification and verification purpose.
vi
3.Password system
A Password is a word, phrase, or string of characters intended to differentiate an authorized user
or process (for the purpose of permitting access) from an unauthorized user, or put another way,
a password is used to prove one's identity, or authorize access to a resource.
4.Pattern recognition
Pattern Recognition is the method of identifying and distinguishing the patterns, from the
images that are fed as input, and the output is obtained in the form of patterns. There are five
different phases in pattern recognition, such as sensing, segmentation, feature extraction,
classification and post-processing. With the help of these phases, pattern recognition can be
done on any type of input like image recognition, biometric recognition, facial recognition,
colours and shapes, recuperating patterns from distorted inputs, etc.
5.Ear recognition
In recent years, ear has attracted considerable and growing interest in biometric community due
to its inherent characteristics compared to other traits. Unlike face, ear is insusceptible to facial
expressions, emotions, glasses, makeup and it keeps unchanged from 8 to 70 years old (Kamboj
et al. 2021). Nowadays, with outbreak of COVID-19, people wearing masks for prevention
purposes. Hence, it is very challenging for face identifcation systems to recognize persons.
Additionally, ear is a non-intrusive trait because it can typically be acquired without informing
the concerned person. Another appealing property of the ear is its high distinctiveness even in
the case of identical twins.
vii
viii
TABLE OF CONTENTS
NO. NO.
ABSTRACT iii
LIST OF FIGURES ix
1 INTRODUCTION 1
ix
1.2.2 Monopole antenna 2
x
2 LITERATURE SURVEY 14
2.1 INTRODUCTION 14
3 PROBLEM STATEMENT 19
3.1 INTRODUCTION 19
REFERENCES
xi
LIST OF FIGURES
NO. NO.
ix
x
LIST OF TABLES
4.1 SUBSTRATE 25
SPECIFICATION
xi
LIST OF ABBREVIATIONS
dB DECIBEL
RF RADIO FREQUENCY
xii
1. INTRODUCTION
2. LITERATURE SURVEY
3. PROBLEM STATEMENT
13
5. PROPOSED BLOCK DIAGRAM
6. TOOLS USED
7. METHODOLOGY
REFERENCES
[1] Shikha Sukhija, R.K. Sarin “Design and performance of two-sleeve low profile
antenna forbio-medical applications” Journal of Electrical Systems and Information
Technology, Vol 04, 2017.
14