Professional Documents
Culture Documents
Why Biometric?
It is a methods of recognizing a person based on a physiological or behavioral characteristic. It is a very convenient and accurate way for personal authentication. Also minimizes ID fraud through unauthorized use of lost, stolen or "borrowed" ID cards, PINs and passwords.
Fingerprint Analysis
Using the entire fingerprint image in analysis uses a lot of processing power. So most fingerprint scanner systems compare specific features of the fingerprint, called minutiae. Also the uniqueness of a fingerprint can be determined by a series of ridges and furrows on the surface of the finger.
Cont..
Fingerprint matching techniques can be placed into two categories: 1. minutiae-based 2. correlation based
Hardware Implementation
The Mobile Unit
AT89C55WD Microcontroller
The AT89C55WD provides the following standard features:
20K bytes of Flash memory, 256 bytes of RAM, 32 I/O lines (4 ports), three 16-bit timer/counters two-level interrupt architecture a full-duplex serial port clock circuitry.
Fingerprint Module
Fingerprint recognition module consist of an optical sensor and a processing board. When a user places their finger on the Fingerprint Recognition Device (FRD) for the first time, the fingerprint is scanned and a 3-D fingerprint image is captured. The user is enrolled in the database after a special minutia based algorithm extracts key minutiae points from the live image. Converts the data into a unique mathematical template which is then encrypted and stored.
Cont..
When the local wall unit queries the central server, the server returns the records of all the students registered. The data for a student who has entered his/her roll number is fetched wirelessly and matching is performed on the FIM module. The result is sent back to the wall unit from where it reaches the microcontroller to display the message onto the LCD.
Alphanumeric Keypad
A standard telephone keypad is used.
Cont..
The keypad is connected to the port 2 of the microcontroller. The first four bits correspond to the rows and next 3 bits correspond to the columns.
To determine which key has been pressed we scan all the rows one by one after a fixed time delay.
ADVANTAGES
1. No manual errors 2. No false attendance 3. Need not remember any password 4. Need not to carry any card
APPLICATION
1. Industries use fingerprint modems for attendance & machine operation authentication. 2. Banks and ATM 3. Voter Identification and electoral enrollment 4. Personal Computers 5. Automotives and high end cars
CONCLUSION
BIOBLIOGRAPHY
[1]http://bioinsec.com [2]http://fingerprintindia.com [3] The 8051 Microcontroller and Embedded Systems by Muhammad Ali Mazidi, ISBN: 0138610223, Prentice Hall; 1st edition [4]http://electronicproject.com [5]http://alldatasheet.com
THANK YOU