0% found this document useful (0 votes)
29 views5 pages

Contact Recognition System Using Fingerprint

btech final year project file

Uploaded by

Rahul sikdar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views5 pages

Contact Recognition System Using Fingerprint

btech final year project file

Uploaded by

Rahul sikdar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Contact Recognition System Using Fingerprint

Sensor
1) Background/ Problem Statement

High-security authentication systems are essential to safely access the


Internet or any other important resource. However, studies show that
users usually choose weak passwords, frequently re-use passwords
across multiple sites, and often forget them. According to the 2002 NTA
Monitor Password Survey, heavy web users have an average of 21
passwords, 81% of users choose a common password, and 30% write
their passwords down or store them in a file. Automated identity
authentication using fingerprint recognition is an effective solution in
such cases.
We have introduced our Contact Recognition System using Fingerprint
Sensor to tackle the problem of memorizing passwords and maintaining
the security of different identities. A fingerprint is a graphical pattern of
ridges and valleys on the surface of a human finger. Due to the
uniqueness and permanence of fingerprints, they are among the most
reliable human characteristics that can be used for personal
identification.

2) Working of the Project


The use of fingerprints in biometric identification has been the most
widely used authentication system. The uniqueness of the fingerprint
for every human provides us with all we need for faultless
identification.
Our android-based project comprises 1 module: User.
The user would need to register first. First, the system will capture the
fingerprint data of the user. After the fingerprint is captured
successfully, the user would require to enter the contact details. To log
in, the user would have to first authenticate their fingerprint. After the
authentication is successfully completed, the user can view the profile.
In this project, the front end involves XML and the back end involves
SQLite. The programming language used is JAVA. The IDE used is
Android Studio.

2) Advantages

 The system is easy to maintain.


 It is user-friendly.
 High security and assurance.
 Fingerprints are non-transferable.
 High level of accountability.

3) System Description
The system comprises 1 major module with their sub-modules as
follows:

 User:

Register User:

The system will capture the fingerprint of the user.


The user will then require to enter the contact details.

Login:

To log in, the user would require to authenticate using their


fingerprint.
After fingerprint authentication, the user can view the profile.

4) Project Life Cycle

The waterfall model is a classical model used in the system


development life cycle to create a system with a linear and sequential
approach. It is termed a waterfall because the model develops
systematically from one phase to another in a downward fashion. The
waterfall approach does not define the process to go back to the
previous phase to handle changes in requirements. The waterfall
approach is the earliest approach that was used for software
development.

You might also like