predefense presentation
TRANSCRIPT
![Page 1: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/1.jpg)
PRESENTATION
Project Title:
“FINGERPRINT RECOGNITION FOR . SECURITY”
By BISANGABAGABO Alphonse
Registration Number: GS20100516
Supervisor: Dr. NGARAMBE Donart.
![Page 2: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/2.jpg)
ABSTRACT Fingerprint recognition refers to the automated
method of verifying match between two human fingerprints. This project will study on the use of “Fingerprints” to improve the way student’s identification for security is done within KIST. The algorithm used is based on Fingerprint Scanning, Fingerprint Matching, Identification image. The Project implementation will use C programming language as a programming tool.
![Page 3: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/3.jpg)
INTRODUCTION Nowadays, authentication is among the most
challenging issues in different sectors of life. The use of ID cards, PINs, Passwords can be forgotten or guessed, cards and badges can get lost, stolen or lent to a friend for the illegal use. The same case can happen in any institution. This project is planned with objective of finding accurate solution to that issue specifically in KIST, where anybody has to identify him/her self to a security guard using card.
![Page 4: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/4.jpg)
Introduction Cont’d
The use of Biometrics technology is the solution. A fingerprint was found to have specific characteristics (Minutiae) that are unique to anybody. The advantage of using Fingerprint recognition applications can be summarized into three classes
Easy mode lifePrevent fraudControl
![Page 5: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/5.jpg)
INTRODUCTION Cont’d The Oldest form of Biometrics
Highly Reliable
Uses distinctive features of fingers
No thief can steal it.
Never forgotten at home.
![Page 6: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/6.jpg)
GENERAL OBJECTIVES
To replace token based authentication by biometric recognition methods.
To build automatic and rapid system in order to optimize the authentication check.
![Page 7: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/7.jpg)
SPECIFIC OBJECTIVES
To apply new technology in everyday life in the vision of avoiding fraud and security risk of being confused.
To remove students stress in case cards are forgotten or lost.
To reduce task of security guards and let the decision be automatic.
![Page 8: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/8.jpg)
EXISTING SYSTEMIn KIST Fingerprint system already exists. It simply
monitors the employee’s arrival and/or leave time.
For student identification, cards are presented to a security guard on entrance gates.
The existing system is limited in functionalities, new features need to be added.
![Page 9: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/9.jpg)
PROPOSED SYSTEM
Fingerprint image aquisition
Authorized
image Processing
Stored in database
Refused
Compare to Database
Image Processing
Fingerprint image aquisition
![Page 10: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/10.jpg)
PROBLEM STATEMENTSome outside people enter the KIST gates using stolen or
borrowed students cards.
Some times, students miss classes when cards forgotten, lost or stolen.
![Page 11: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/11.jpg)
PROCESS
This project will proceed successive stages following the modified waterfall model. Each step starts when the previous is finished
It is possible to review a finished stage and make some modification whenever needed.
![Page 12: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/12.jpg)
SOFTWARE PLATFORMOperating system (OS) Name: Microsoft Windows xp
ProfessionalOS version : 5.1.2600 Service Pack 2
Build 2600 OS Configuration : Standalone WorkstationMicrosoft visual c++Sql server 2005
![Page 13: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/13.jpg)
HARDWARESystem manufacturer : Dell Computer
CorporationModel : Latitude D400System type : X86-based PC Processor: [01]: x86 family 6 Model 13 stepping 6
Genuine Intel1594 MHz BIOS version: DELL – 27d40903Physical memory: 510 MBVirtual Memory: 2048Storage: 60 GB
![Page 14: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/14.jpg)
SCOPE OF PROJECTThis project “Fingerprint recognition for Security” will use a sample of hundred (100) fingerprints because of the time and resource limitation.
The system we will develop will be tested on a single computer.
All the activities and researches of this project will take place inside KIST using available and accessible resources.
![Page 15: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/15.jpg)
GANTT CHART
![Page 16: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/16.jpg)
LITTERATURE REVIEW
![Page 17: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/17.jpg)
FINGERPRINT
impression of the friction ridges of all or any part of the finger.
Oldest form of Biometrics
Highly Reliable
Uses distinctive features of fingers
![Page 18: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/18.jpg)
FINGERPRINT SCANNER/SENSOR A fingerprint
sensor is an electronic device used to capture a digital image of the fingerprint pattern.
![Page 19: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/19.jpg)
FINGERPRINT
impression of the friction ridges of all or any part of the finger.
Oldest form of Biometrics
Highly Reliable
![Page 20: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/20.jpg)
APPLICATIONSPersonal computer / workstation security.Network / enterprise security. e-commerce / e-business. Electronic transactions. Physical Access Control (e.g. Airport)Information System SecurityNational ID SystemsIdentification of Criminals
![Page 21: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/21.jpg)
FLOW CHART
![Page 22: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/22.jpg)
USE CASE DIAGRAM
![Page 23: predefense presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062513/555b6055d8b42a932e8b4d05/html5/thumbnails/23.jpg)
. THANK YOU FOR YOUR ATTENTION