Professional Documents
Culture Documents
Biometric Authenticated Atm Machine Syst (1) - 1
Biometric Authenticated Atm Machine Syst (1) - 1
DECLERATION
We declare that, this is our work and that all part of the project report is by our own idea and
with some reference from internet. This project paper is submitted to school of Electrical and
Computer engineering Control stream at Jimma institute of technology.
This is to certify that the above declaration made by our effort is correct to the best of our
knowledge. In doing so, we prove that we agree with all written above with our signature as
follows.
Name Id Signature
Adivisor Dr.Parashanth
Signature………….
Examiner…………………
Signature…………………
ACKNOWLEDGMENT
Firstly, we would like to express our deepest gratitude to our respected advisor Dr.Parashanth for
his humble guidance, encouragement, patient enthusiasm, invaluable support and motivation
through the whole completion of this project. This project would not be succeeded without his
continuous support. Secondly, we would like to drop our sincere appreciation to thank to our co-
workers who have been tolerant, motivated us and support us all these semester in accomplishing
this project. Thanks for their encouragement, love and emotional supports that they had given to
us. Last but not least, we would like to express our heartiest appreciation to our friends and JIT
member’s and those whom involve directly or indirectly with this project. There is no such
meaningful word thank, thank you So Much.
ABSTRACT
In this project we have done on biometric authentication system that is finger print authentication
system. Biometric authentication system is used for different purpose in place of visa cards or
automated teller machine (ATM) cards because of the visa or ATM card and the password is
forgotten during a person travel from one place to other place. Due to difficult to remember and
memorize of this two things (visa cards and password) we design this biometric authentication
system, since biometric authentication system is safe and secure, unforgettable and also very
easy to use everywhere. Biometric authentication system is reliable, economical, save time, and
has more advantage compare to other like visa cards. The user suspect their password may be
stolen or attack by thief then the user change their password when they expect the password
attack by the thief. In order to solve this kind of problem we design biometric authentication
system (finger print), because biometrics is the science of using human measurements to identify
people. This technology not only make our lives easier and simple by reducing the required to
carry identification but also it prevents the use of forget visa card or ATM and passwords.
Biometric is selective because of why? It has unique characteristics that is no one shares and
remain the same over time.
Table of Contents
ACKNOWLEDGMENT ............................................................................................................................ II
ABSTRACT ................................................................................................................................................ III
List of figure ............................................................................................................................................... VI
List of table ................................................................................................................................................ VII
ACRONYMS ............................................................................................................................................ VIII
CHAPTER ONE ..................................................................................................................................... - 1 -
1. INTRODUCTION ............................................................................................................................ - 1 -
1.1. BACKGROUND ...................................................................................................................... - 2 -
1.2. STATEMENT OF PROBLEM ............................................................................................... - 3 -
1.3. OBJECTIVE OF THE PROJECTS ....................................................................................... - 3 -
1.4. PROJECT SCOPE................................................................................................................... - 4 -
1.5. SIGNIFICANCE OF THE PROJECT................................................................................... - 4 -
1.6. LIMITATION OF THE PROJECT ....................................................................................... - 4 -
1.7. THESIS OVERVIEW.............................................................................................................. - 5 -
CHAPTER TWO .................................................................................................................................... - 6 -
2. LITERATURE REVIEW ................................................................................................................. - 6 -
2.1 GENERAL LITERATURE REVIEW ........................................................................................ - 6 -
CHAPTER THREE ................................................................................................................................ - 9 -
3. METHODOLOGY AND SYSTEM BLOCK DIAGRAM............................................................... - 9 -
3.1 METHODOLOGY...................................................................................................................... - 9 -
3.2 OVERVIEW OF SYSTEM BLOCK DIAGRAM ................................................................ - 11 -
3.3. COMPONENTS DESCRIPTION ........................................................................................ - 12 -
CHAPER FOUR ................................................................................................................................... - 25 -
4. System design and simulation ......................................................................................................... - 25 -
4.1. Finger print modules recognition ......................................................................................... - 26 -
4.2 BLOCK DIAGRAM OF THE SYSTEM .............................................................................. - 30 -
4.3. Overall flow chart of the projects ......................................................................................... - 31 -
CHAPTER FIVE .................................................................................................................................. - 34 -
List of figure
Figure 1.Methodology............................................................................................................................... - 9 -
Figure 2 system block diagram ............................................................................................................... - 12 -
Figure 3 PIC Microcontroller................................................................................................................. - 15 -
Figure 4 LCD diagram. ........................................................................................................................... - 18 -
Figure 5 power supply unit ..................................................................................................................... - 19 -
Figure 6 diagram of motor used .............................................................................................................. - 20 -
Figure 7 print authentication ................................................................................................................... - 21 -
Figure 8 binarization of fingerprint ......................................................................................................... - 21 -
Figure 9 Crystal oscillator interfaced with PIC....................................................................................... - 22 -
Figure 10 Diagram of keypad ................................................................................................................. - 23 -
Figure 11 System model diagram. .......................................................................................................... - 25 -
Figure 12 Simulation circuit of customer to enter the password ............................................................ - 26 -
Figure 13 Flow chart of basic fingerprint modules recognition .............................................................. - 27 -
Figure 14 Simulation of wrong code fingerprint entered. ....................................................................... - 29 -
Figure 15 Simulation for correct fingerprint entered. ............................................................................. - 30 -
Figure 16 The overall flow chart of the project. ..................................................................................... - 33 -
Figure 17 Final project design while displaying the finger print authentication ATM security system. - 33 -
List of table
ACRONYMS
ATM: Automated teller machine
CHAPTER ONE
1. INTRODUCTION
One of our highest priorities in the world of information security is conformation that a person
accessing sensitive, confident, or classified information is authorized to do so. Such access is
usually accomplished by a person’s proving their identity by the use of some means or method of
authentication. Simply put, a person must be able to validate who they say are before accessing
information, and if the person is unable to do so, access will be denied. Generally speaking, a
system can identify you as an authorized user in one of three ways:–what you know, what you
have, or what you are. The most widely used of the three methods is what we know passwords or
other personal information. A more sophisticated method of authentication is what we have smart
cards and tokens. The last method is what we are biometric technology. Biometric is a field of
technology which has been and is being used in the identification of individuals based some
physical attribute. Many research has permitted there has been an effort by several tech companies
to develop standards for hardware and software that would be used throughout the industry in
further development within this area. The purpose of this project will be to look at the use of
biometrics technology to determine how secure it might be in authenticating user’s and how the
users job function or role would impact the authentication process or protocol. We will also
examine personal issue of privacy in the methods used for authentication; the cost of implementing
a biometrics authentication system, the efficiency of biometric authentication and the potential for
false or negative recognition of individual users. Generally biometric system can identify users
based on either physiological or behavioral characteristics. At present, biometric technology holds
great deal of promise for doing just that, but is not without its limitation and certainly not without
its critics.
1.1. BACKGROUND
Biometric identify people by measuring some aspects of individual anatomy or physiology (such
as your hand geometry or finger print), some deeply Ingrained skill, or other behavioral
characteristics (such your handwritten signature), or something that is a of the two (such as your
voice). Biometric authentication technologies such as face, finger, hand, and iris and speaker
recognition are commercially available today and are already in use. Biometric system is
essentially a pattern recognition system that operates by acquiring biometric data from an
individual, extracting a feature set from the acquire data, and comparing this feature set against
the template set in the database. Depending on the text, a biometric system may operate either in
verification mode or identification mode.
Verification mode: In the verification mode, the system validates a person’s identity by
comparing the capture biometric data with his/her own biometric templates stored system
database. In such a system, an individual who desires to be recognized claims an identity, usually
through a PIN(Personal Identification Number), a user name, a smart card etc…, and the system
conducts a one to one comparison to determine the claim whether the claim is true or wrong.
Generally identity verification is typically use for positive recognition, where the aim is to
prevent many people from the same identity.
Identification mode: In this mode the system recognizes an individual by searching the
templates of all the user in the database for a match. As a result the system conducts a one to
many comparison to establish an individual identity without the subject having to claim an
identity for instance “whose biometric data is this?”. Identification is a critical component in
negative recognition application where the system establishes whether the person is who
implicitly or explicitly denies to be. The purpose of negative recognition is to prevent single
person from using multiple identity’s. Identification may be used in positive recognition for
convenience that the user is not required to claim an identity while traditional method of personal
recognition such as passwords, PINs, keys, and tokens may work for positive recognition can
only be established through biometrics.
With today’s systems, individuals can authenticate their identity by one or an arbitrary
combination of the following three means:
User cannot pass their biometric characteristics to other user as easily as they do with their card or
password. Biometric objects cannot be stolen as tokens, keys, cards or other used for the traditional
user authentication. Most biometric techniques are based on something that cannot be lost or
forgotten.
Chapter two: covers the extensive literature review of previous works on biometric ATM machine
system and different established standards and protocol and the plat form of it how can it
implemented
Chapter three: Methodology and system block diagram: in this chapter brief description of about
the structure and interfacing of the devices such as PIC microcontroller, LCD display fingerprint
modules being used are proposed.
Chapter four: system design and Implementation: which covers the detail design and
implementation of all parametric and the overall integrated system or the main projects simulation
results of biometric authentication ATM machine system.
Chapter five: conclusion and recommendation: this chapter concludes the entire work performed
during the projects and point out some few recommendations on improving the performances and
the efficiency.
CHAPTER TWO
2. LITERATURE REVIEW
2.1 GENERAL LITERATURE REVIEW
Most finger print scan technologies are based minutiae. Samir Nanavati states that most finger
scan technologies are based on minutiae matching but that pattern matching is a leading alternative.
This technology bases its feature extraction and template generation on a series of ridges, as
opposed to discrete point.
The use of many ridges reduces dependence on minutiae points, which tend to be affected by wear
and tear. The downside of pattern matching is that it is more sensitive to the placement of the finger
during verification and the created template is several times larger in byte size. Finger scan
technology is proven and capable of high levels of accuracy. This is a long history of fingerprint
identification, classification and analysis. This along with distinctive features of fingerprints has
set the finger scan apart from other biometric technologies.
There are physiological characteristics more distinctive than the fingerprint such as iris and retina,
but automated identification technology capable of leveraging these characteristics have been
developed only over the past some years. The technology has grown smaller, more capable and
with many solutions available. Devices slightly thicker than a coin and an inch square in size are
able to capture and process images. Additionally, some may see the large number of finger scan
solutions available today as disadvantages and as advantage by ensuring marketplace completion
which has resulted in in a number of robust solutions for desktop, laptop, tablet, physical access
and point of sale environments. Biometric data are separate and distinct from personal information.
Biometric templates cannot be reverse engineered to recreate personal information and they cannot
be stolen and used to access personal information.
Current biometric systems are generally inflexible and not optimized for use within an enterprise.
Most biometric systems are monolithic, thick-client or standalone applications with very little
ability to interface to enterprise management information systems (MISs). Many biometric
applications do offer some interoperability and integration points with and for established MISs
such as PeopleSoft, SAS, Oracle and the like for personnel and accountability functions. However,
the ability of such enterprise systems to collaborate across a diverse set of biometric systems is
limited because of the lack of standardization and enterprise architecture support amongst the
various biometric systems. Likewise, there is a distinct lack of robust architectural support within
the security and legal domains when using biometrics in those business contexts evidenced by the
significant investment in stovepipe biometric systems.
Thus, the biometric market today is continuing a trend towards monopolistic stovepipe systems
risking higher prices and less innovation. Small scale, open-source initiatives however
demonstrate the opportunity for improving biometric system collaboration and performance
through higher quality and modern architectural choices. Our intent with this project is to highlight
alternatives for implementing biometric architecture for favorable consideration across an
enterprise. This project could become the basis for goals to which an enterprise could subscribe
when looking to improve their biometrics-business function capability sets. This could be
considered whether an enterprise is updating or upgrading present, existing biometric
infrastructure, or is considering a wholesale reconfiguring, re-architecting, or re-implementing of
business functions supported by biometric identification capabilities.
The purpose of this project is to document and demonstrate the comparison and trade-off of current
systems within their current architecture to like systems supported by a more robust and modern
architecture. To enhance the reliability of biometric based ATM systems, we propose that three
types of biometrics are used in conjunction for returning a clear authentication. The user provides
at the ATM machine, a fingerprint, eye print and palm print biometrics. These data pass over the
network to three different servers and at least two servers must return a clear authentication. This
method efficiently fights the hackers and network spyware systems and ensures that the users
resources are safe.
Now a day ATM with magnetic strip authenticated only by inserting password on the ATM
machine. But according to today’s scenario, cases of fraud are another problem. So they
provided fingerprint for more security. Now a days we are directing towards the pile of new
powerful, intelligent, auto rated system, which will give us easy to do the work smoothly, Thus
systems are not dependent on human support, one of these ATM SECURITY SYSTEM which
we have evolved. Today, ATM systems use PIN & access card for identity verification. The
recent advance in biometric identification techniques, retina scanning, including fingerprinting,
and facial recognition has made a great effort to rescue the unsafe situation at the ATM. This
research investigated the development of a scheme that integrates facial recognition technology
into the verification process used in ATMs. An ATM system that is reliable in providing more
security by using facial recognition is proposed. The development of such a scheme would help
to protect clients & financial institutions alike from intruders and identity thieves. This paper
concentrates on an ATM security system that would combine a physical access card, a Personal
Identification Number, & electronic facial recognition that will go as far as withholding the
fraudster’s card. Nevertheless, it's obvious that man’s biometric features cannot be replicated,
this proposal will go a long way to solve the problem of Account safety making it possible for
the actual account owner alone have access to his accounts. The combined biometric features
approach is to serve the purpose both the identification and authentication that card and PIN do.
2.2. What is Identification Authentication?
Identification is the process by which the identity of a user is established, authentication is the
process by which a service confirms the claim of a user to use a specific identity by the use of
credentials. Biometrics is very reliable for authentication. The difference is between a system
that looks at a hand geometry and says “this is Doctor Hunk” (identification) versus a man “who
says “I, Doctor Hunk, present my hand to prove who I am? And the system confirms this hand
matches Doctor Hunk’s template (authentication). Biometric authentication is feasible today.
2.3. What is biometric authentication?
Biometrics is biological authentications, based on some physical characteristics of the human
body.
The list of biometric authentication technologies is still growing. There are two categories of
biometric identifiers include physiological and behavioral characteristics. Physiological
characteristics are related to the shape of the body, and include but are not limited to: fingerprint,
face recognition, DNA, palm print, hand geometry, iris recognition (which has largely replaced
retina). Behavioral characteristics are related to the behavior of a person, including but not
limited to: typing rhythm, gait, digital signature and voice. More traditional means of access
control include token-based identification systems, such as driver’s license or passport, and
knowledge-based identification systems, such as password or Personal Identification Number
(PIN).
CHAPTER THREE
3. METHODOLOGY AND SYSTEM BLOCK DIAGRAM
3.1 METHODOLOGY
Among the methods that we for our project include the following.
`
Determine the specification of the selecting materials
Figure 1.Methodology
The design of entire system consisted of two part which are hardware and software. The
hardware is designed by the rules of embedded system, and the steps of software consisted of
three parts. The more details are shown as follows.
A. Hardware Design
The modules of LCD, keyboard, fingerprint recognition are connected with the main chip PIC
16F877A.
There are some modules consisted of the system as follows:
Fingerprint module: fingerprint processing includes two part: fingerprint enrollment and
fingerprint matching (the matching can be 1:1 or 1: N).when enrolling, user needs to
enter the finger two times. The system will process the two time finger images, generates
a templates of the finger based on processing results and store the template. When
matching, user enters the finger through optical sensor and system will generate a
template of the finger and compare it with templates of the finger library. For 1:1
matching, system will compare the live finger with specific template designated in the
Module; for 1: N matching, or searching, system will search the whole finger library for
the matching finger. In both circumstances, system will return the matching result,
success or failure.
LCD Display: A liquid crystal display (LCD) is a thin, flat panel used for electronically
to display information such as text, images, and moving pictures. Its uses include
monitors for computers, televisions, instrument panels, and other devices ranging from
aircraft cockpit displays, to every-day consumer devices such as clocks, watches,
calculators. Among its major features are their lightweight constructions. Its low
electrical power consumption enables it to be used in battery-powered electronic
equipment. It is an electronically-modulated optical device made up of any number of
pixels filled with liquid crystals and arrayed in front of a light source (backlight) or
reflector to produce images in color or monochrome.
B. Software design
mikroC PRO for PIC and this manual are owned by mikroElektronika and are protected
by copyright law and international copyright treaty. Therefore, you should treat this manual
like any other copyrighted material (e.g., a book). The manual and the compiler may not be
copied, partially or as a whole without the written consent from the mikroEelktronika. The
PDF-edition of the manual can be printed for private or local use, but not for distribution.
Modifying the manual or the compiler is strictly prohibited
High risk activities:
The mikroC PRO for PIC compiler is not fault-tolerant and is not designed, manufactured
Or intended for use or resale as on-line control equipment in hazardous environments requiring
Fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation or
Communication systems, air traffic control, direct life support machines, or weapons systems,
in which the failure of the Software could lead directly to death, personal injury, or severe
Physical or environmental damage ("High Risk Activities").mikro Elektronika and its suppliers
Specifically disclaim any express or implied warranty of fitness for High Risk Activities.
License agreement:
By using the mikroC PRO for PIC compiler, you agree to the terms of this agreement.
Only one person may use licensed version of mikroC PRO for PIC compiler at a time.
Copyright © mikroElektronika 2003 - 2009.
This manual covers mikroC PRO for PIC version 1.1 and the related topics. Newer versions
may contain changes without prior notice.
Now a days, in the self-servicing banking system, has got extensive popularization with the
characteristic offering high quality 24 hours for the customers. Using the ATM (automated
teller machine) which provide the customers with the convenient banknote trading is very
common. However, the financial crime case rises repeatedly in recent year, a lot of criminals
tamper with the ATM terminal and steal user’s credit card and password by illegal means.
Once user's bank card is lost and the password is stolen, the criminal will draw all the cash in
short time, which will bring enormous financial losses to the customer. Traditional ATM
systems authenticate generally using the credit card and password, the method has some
defects. Using credit card and password cannot verify the client’s identity exactly.
The biometric authentication of ATM machine is a securing system that ask the customer’s
fingerprint in addition to the user’s credit card and password. This security system allows the
customer to give his/her fingerprint only when the valid card and password is given to the
machine, which makes the system more reliable.
Our system block diagram is shown below which includes all the components and illustrates
about the connectivity of the design
MOTOR MOTOR
DRIVER
(ULN2003
MODULE)
FINGER
PRINT
SCANNER
Figure 2 system block diagram
The main reason is that Microchip Technology has continuously upgraded the device
architecture and added needed peripherals to the microcontroller to suit customers' requirements.
This microcontroller is required to serve the purpose monitoring the transformer information such as
temperature, voltage, current and oil level through the LCD display, send SMS alert when there is any
fault. Modern power networks require faster, more accurate and reliable protective schemes.
Following are some distinctive attributes of the PIC 16F877A from its other counterparts.
A .Excellent Performance RISC CPU: PIC 16F877A uses Reduced Instruction Set Computer due to
following fundamental advantages
There are very limited amount of instructions that the programmer has to memorize Majority
of instructions (more than 95 %) takes only one cycle for their execution.
The processing or working speed is very high (like twenty megahertz for the clock input)
The amount of duration required for each instruction to be executed is very less (not more than
200 nanoseconds).
The amount of available memory is in abundance and is sufficient enough for the requirements
of regular projects.
B. Peripheral Features: Some of the peripheral features of the PIC 16F877A are listed below.
PIC 16F877A encompasses of three different types of timers with special functionalities.
First of them is termed as Timer0. It is an eight bit timer, can also be used as a counter. The
function of pre-scalar is also inherent in it.
There is another timer enclosed in this Micro-Controller referred to as Timer1. With respect to
the size it is larger than the previous timer and constitutes of sixteen bits.
Last but not the least Timer2 is also present in this Micro-Controller, with the feature of post
scalar in addition to pre-scalar.
C. Analog Features:
1) It comprises of a built-in Analog to Digital converter of ten bits and constituting eight channels
for conversion.
2) To prevent the sensitive circuitry of the Micro-Controller it encompasses an option of Brown out
Reset.
D. Distinctive Micro Controller Features: There are certain types of unique characteristics that are
inherent in this type of Micro-Controller
Features of PIC16f877A:
5 input/output ports
3 timers
2 CCP modules
Special features:
PIC 16F877 has 5 basic input/output ports. They are usually denoted by PORT A, PORT B,
PORT C, PORT D, and PORT E. these ports are used for input/output interfacing.
3.1.2.EEPROM (memory)
EEPROM (electrically erasable programmable read-only memory) is user-modifiable read-only
memory (ROM) that can be erased and reprogrammed (written to) repeatedly through the
application of higher than normal electrical voltage. Unlike EPROM chips, EEPROMs do not
need to be removed from the computer to be modified. However, an EEPROM chip has to be
erased and reprogrammed in its entirety, not selectively. It also has a limited life that is, the
number of times it can be reprogrammed is limited to tens or hundreds of thousands of times. In
an EEPROM that is frequently reprogrammed while the computer is in use, the life of the
EEPROM can be an important design consideration. A special form of EEPROM is flash
memory, which uses normal PC voltages for erasure and reprogramming [6].
3.1.3.LCD Display
LCD-Liquid Crystal Display is an electronic device for displaying text or Characters [2]. We are using 14
pin LCD. 16*2 represents 16 characters and 2 line display. LCD’s are economical and easily
programmable and can easily display special and custom characters.
A unipolar motor (also called homopolar) is a (DC) motor typically with slip-rings on each end of
a cylindrical rotor and field magnets or a DC field winding generating a magnetic field on the
stator. The rotor has typically not winding but just straight connections in axial direction between
the slip-rings e.g. a copper tube encasing the rotor or rods embedded in the rotor. The field is
uniformly perpendicular to the cylindrical rotor surface and does not change polarity over the 360-
degree perimeter of the cylindrical part of the rotor. That means if the field is considered entering
the rotor between the slip-rings it must leave the rotor though the rotor's end surfaces. It is not
important that the magnetic field is generated from the stator a similar field may be generated from
the rotor with the same effect the magnetic fields would not rotate with the rotor. Unipolar motors
and generators are rarely built anymore because of advancing technology.
+88.8
The advent of fast growing technologies makes users to have high security systems with
electronic identification options. These identification technologies include ATM and other
intelligent, cards, user password based system and so on. But, unfortunately these are unsecure
due to hacker attacks, thefts, and forgotten passwords. In spite of all these shortcomings and
malfunctions these systems are still prevailing; however, the biometric authentication based is
the most efficient and reliable solution for stringent security.
A wide variety of finger print devices are available in the market today that varies in cost and
method of matching fingers mostly involving one or whole five fingers of the hand. There are
various approaches for matching the fingers like matching finger print minutiae, straight pattern
matching, more fringe and ultrasonic patterns.
Fingerprints form a unique identification pattern for humans, which consist of a pattern of ridges
on fingers that helps to grip things by hand. Fingerprint scanner is the heart of this automated
authentication system which is responsible for the acquisition of images based on the patterns of
ridges and valleys of human fingers, and then matching them with the pre-stored patterns. It
consists of sensors that are optical, ultrasonic, thermal, capacitive etc. mostly optical and
capacitance scanning methods are used.
COLOMN:
ROW:
When you press key pad button respective key values will displays on the LCD .
CHAPER FOUR
4. System design and simulation
The designed biometric authenticated fingerprint ATM machine uses:- PIC16F877A controller,
fingerprint modules, crystal oscillator, motor, motor deriver, key pad, and LCD display. At this
stage we have actually design each block and describe actual implementation of circuit of each
block and finally integrated them into the complete working system.
Finger
PIC Micro LCD
Print from
controller DISPLAY
Customer
The design of algorithm based on fingerprint recognition is so vital for the whole system. We
would approach two steps to process the images of fingerprint.
1) The detail of fingerprint recognition process.
The first step was the acquisition of fingerprint image by above device mentioned in the
algorithm, and the results could be sent to the following process. Secondly, pre-processing
the images acquired. After obtain the fingerprint image, it must be pre-processing. Generally,
pre-processing of one's is filtering, histogram computing, image enhancement and image
binarization. Lastly, the characteristic value was extracted, and the results of the above
measures would be compared with the information of owner's fingerprint in the database so
as to verify whether the character is matched, and then the system returned the results
matched or not.
2) The design of fingerprint image enhancement
Fingerprint recognition module is an extremely important part of the system, the high-quality
images was the major factors of influencing the performance in the system. The algorithm of
fingerprint recognition based on the algorithm of Gabor and direction filter was used.
Fingerprint enhancement algorithm based on Gabor filter could be better to remove noise,
strengthen the definition between the ridge and valley, it could significantly improve the
image enhancement processing capacity, but this algorithm was slow in dealing with the high
capacity requirements.
A fingerprint recognition system is done using three steps known as Image acquisition,
Minutiae extraction and Minutiae matching. The block diagram of basic fingerprint recognition
system is shown in figure below.
Image capture
Matching Stored
pattern
The three basic patterns of fingerprint ridges are the arch, loop, and whorl:
i. arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then
exit the other side of the finger.
ii. Loop: The ridges enter from one side of a finger, form a curve, and then exit on that same
side.
iii. Whorl: Ridges form circularly around a central point on the finger.
If the fingerprint that the customer entered is matched with the stored one the LCD display will
show that “WRONG CODE” because that the fingerprint of each customer is stored in the
memory in terms of binary codes.
But if the entered fingerprint is the same as that of the stored one the LCD display will shows
“WELLCOME” as like this
password and its fingerprint. When the user’s fingerprint matches with the data stored by the
microcontroller, the tansact will be possible. If not, it is impossible.
The flow chart that we use to design our system effectively is shown below.
The final flow chart that we developed gives the detailed information about how the system can
be developed and how they are integrated and combine all the major parameters of the PIC micro
controllers for monitoring and fault detecting purpose. The system checks these parameters
whether or not they are in normal condition. The microcontrollers send the monitored parameters
to LCD display.
Start
User
Read the
fingerprint
Scan the
finger print
and add the
password
Check
NO for
authenti
cation
Save the
Yes
data
Enter the
password
Verify
NO
Figure 17 Final project design while displaying the finger print authentication
ATM security system.
CHAPTER FIVE
5. CONCLUSION AND RECOMMENDATION
5.1. CONCLUSION
The conclusion of this project is that the card should be replaced and it must be simple, easier,
reliable, and secure. Biometrics is a means of verifying personal identity by measuring and
analyzing unique physical or behavioral characteristics of human being like fingerprints. The
purpose of this project will be to look at the use of biometrics technology to determine how
secure it might be in authenticating user’s and how the users job function or role would impact
the authentication process or protocol. We will also examine personal issue of privacy in the
methods used for authentication. Depending on this, a biometric system may operate either in
verification mode or identification mode. Generally identity verification is typically use for
positive recognition, where the aim is to prevent many people from the same identity.
Biometric authentication systems consider all the kinds of problems and disadvantages of card
payment system. The fingerprints system is suggested to be implemented because it is easier,
reliable, feasible, secure and easily authorized to everyone. And there is no any worry that
anyone can stolen my finger are can be loosed anywhere so other body can use it. In fingerprint
payment system customer has to place his fingers on the finger scanner and then scanner will
recognize the account which belongs to that person and charge the bill. So it is easy for the user
because of its reliability. The report also includes some simulation of hardware and software
components of the system.
5.2 RECOMMENDATION
Based on the simulation result from the activities of this project, team members of the project
offers have the following recommendation for better performance of the system:
To become more secure peoples should use this biometric authentication system.
We recommended for the people this system is simple and easy to use in order to reduce
fear.
We also recommended all bank found in Ethiopia to use this system to attract more
customer.
REFERENCES
[1] Lin Hong, Wan Yifei, Anil Jain. Fingerprint image enhancement: algorithm and
performance evaluation [J]. IEEE Transactions on Pattern Analysis and Machine intelligence.
1998,20(8):777-789.
[2] ESaatci, V Tavsanogh. Fingerprint image enhancement using CNN gabor-Cpe filter[C].
Proceedings of the 7th IEEE International Workshop on Cellular Neural Networks and their
Applications 2002: 377-382.
[3] Gu J, Zhou J, Zhang D.A combination model for orientation field of fingerprints. Pattern
Recognition, 2004, 37: 543-553.
[4] Cheng J, Tian J. Fingerprint enhancement with dyadic scale-space. Pattern Recognition
Letters,2004, 25(11): 1273-1284.
[5] ATM terminal dual verification process using finger print recognition Scanner and GSM by
Golla Jayaraju “journal of innovation in electronics and communication vol.1 [1] Oct 2011march
2012”
[6] ATM terminal design is based on fingerprint recognition for security purpose by Jeohaddad
& idhabihigue “(IIETRC) INTERNATIONAL INSTITUTE OF ENGINEERING AND
TECHNOLOGY RESEARCH CENTER VOL NO. 1, ISSUE NO. 2, 030 – 036.
[7] Salil Prabhakar, Anil Jain: “Fingerprint Identification” Anil K. Jain, Arun Ross and Salil
Prabhakar: “An Introduction to Biometric Recognition” IEEE Transactions on Circuits and
Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14,
No. 1, January 2004.
[8] Dileep Kumar, Dr.Yeonseung Ryu, Dr.Dongseop Kwon: “A Survey on Biometric
Fingerprints: The Cradles Payment System” IEEE ISBAST April, 2008.
APPENDIXES
unsigned short kp;
int i = 0, j, cnt;
int w1;
//
void code_enter(){
do
while (!kp);
switch (kp){
code1[i] = kp;
i++;
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
Delay_ms(20);
void change_code(){
i = 0;
code_enter();
code_enter();
code_enter();
code_enter();
code_enter();
code_enter();
code_enter();
code_enter();
code_write();
delay_ms(20);
code_read();
delay_ms(20);
Delay_ms(1000);
void main() {
ADCON1 != 0x07;
TRISC = 0x00;
PORTC = 0x00;
code_read();
//Lcd_Out(1, 1, msg1);
//Delay_ms(500);
Lcd_Out(2, 4, "University");
delay_ms(1000);
Lcd_Cmd(_LCD_CLEAR);
Lcd_Out(1, 1, "security");
Lcd_Out(2, 6, "System");
delay_ms(1000);
cnt = 0;
L1: do{
Lcd_Cmd(_LCD_CLEAR);
i = 0;
code_enter();
if(code1[0] == 42){ // *
//delay_ms(500);
i = 0;
code_enter();
code_enter();
code_enter();
code_enter();
code_enter();
code_enter();
code_enter();
code_enter();
code_enter();
if(code1[0] == '1' && code1[1] == '2' && code1[2] == '3' && code1[3] == '4' && code1[4] ==
'5'&& code1[5] == '6' && code1[6]== '7' && code1[7] == '8'&& code1[8] == '9' ){ // master
code
code_enter();
if(code1[9] == 35){ // #
change_code();
else if(cnt<7 && code1[0] == user1[0] && code1[1] == user1[1] && code1[2] == user1[2] &&
code1[3] == user1[3] && code1[4] == user1[4] && code1[5] == user1[5] && code1[6] ==
user1[6] && code1[7] == user1[7] && code1[8] == 35){ // save password verification
EEPROM_Read(0x21);
w1 = 1;
Delay_ms(20);
EEPROM_Write(0X21, w1);
Delay_ms(20);
EEPROM_Read(0x21);
PORTC=0x03;
Delay_ms(500);
PORTC=0x06;
Delay_ms(500);
PORTC=0x0C;
Delay_ms(500);
PORTC=0x09;
Delay_ms(500);
Delay_ms(1000);
//goto L1;
LCD_Cmd(_LCD_CLEAR);
Lcd_out(1,4,"close");
EEPROM_Read(0x21);
w1 = 0;
Delay_ms(20);
EEPROM_Write(0x21, w1);
Delay_ms(20);
EEPROM_Read(0x21);
PORTC=0x0C;
Delay_ms(500);
PORTC=0x06;
Delay_ms(500);
PORTC=0x03;
Delay_ms(500);
PORTC=0x09;
..