secured fingerprint recognition for automatic … the above review study we are going to implement...
TRANSCRIPT
2nd
International Conference on Engineering Innovations and Solutions (2'ICEIS – 2017)
Seventh Sense Research Group www.internationaljournalssrg.org Page 151
Secured Fingerprint Recognition for
Automatic Ration Management System
V. Kovendan1 Assistant Professor,
Department of computer science,
Sri Venkateswaraa College of Technology
Oragadam, Sriperumbudur, TN, India
Abstract— Fingerprint recognition refers to the
automatic method of identifying or confirming the identity
of an individual based on the comparison of two
fingerprints. Fingerprint recognition is one of the most well
known biometrics and it is by far the most used biometric
solution for authentication on computerized systems. Three
techniques used to identify the finger print are silicon,
optical and ultrasound. Hence this technology is
implemented in the newly designed rationing system. The
present system in the ration shops is like the shopkeeper
sees the ration book of the user and gives the quantity of
grocery the user asks for. But there will not be proper
regularity in issuing the grocery items to the user.
Sometimes even there may be chance that different users
take the grocery on same ration cards. To avoid all these
issues, we have designed secure fingerprint recognition for
automatic ration management system.
Keywords— ADMEGA Microcontroller, Finger
print, GCM Module, PC, Solenoid control circuits.
I. INTRODUCTION
Public distribution system is an Indian food security system. Major commodities distributed include staple food grains, such as wheat, rice, sugar, and kerosene, through a network of fair price shops established in several states across the country. Food Corporation of India, a government entity, manages the public distribution system. The system is often blamed for its inefficiency and rural-urban bias. It has not been able to fulfill the objective for which it was formed card .Government of India provides various facilities for ration distribution towards poor and needy people. In months, if not buy the materials at the end of the month, they will sale to others without any intimation to the government and customers, so the shopkeepers are misusing of these materials by selling in the market and doing corruption. Public Distribution System is one of the widely controversial issues that involve malpractice. The proposed system aids to control the corruption which is taking place in ration shop by replacing manual work with automatic system based on ADMEGA microcontroller. We can also add, update and delete the details of the family member’s information easily. Once consumer is validated by finger print password, the system asks the consumer to select appropriate material and quantity of material through keypad. Based on material chosen by consumer, appropriate circuitry will be activated and consumer gets material.
N. Nivetha2, IV year CSE
Department of computer science,
Sri Venkateswaraa College of Technology
Oragadam, Sriperumbudur, TN, India
GCM interfaced with microcontroller sends information in the form of SMS to related people. The proposed automatic fingerprint ration shop system would bring transparency in public distribution system and become helpful to prevent malpractices.
1.1 Existing Work
In the previous system (fig.1) shopkeeper sees the ration book of the consumer and then provides the grocery the user asks for. User information is maintained manually in the notebook and there will not be proper regularity in providing the grocery items.
Fig.1 Architecture of Ration system
1.2. Related Work:
GCM (fig.2) uses XMPP protocol for message
generation purpose. Where the XMPP and HTTP
protocol are interconnected with the Google cloud
messaging server with the help of these two protocol
GCM server will send an SMS to the consumer’s
mobile phone.
Fig.2 Google Cloud Messaging
II. PROPOSED CONTRIBUTION
Proposed system aids to control the corruption and provides the commodities to the needy and poor people regularly. In proposed system we develop web application for maintaining the ration networks data. It stores the member’s information with finger print
GCM HTTP
XMPP
Android
IOS
Chrome
User Ration shop
(With ration card)
Get the
groceries
Ration book Family
Information
2nd
International Conference on Engineering Innovations and Solutions (2'ICEIS – 2017)
Seventh Sense Research Group www.internationaljournalssrg.org Page 152
based authentication. Only with the users finger print their information can be stored and retrieved [14].
Every consumer has a unique own finger print id which is registered by the Government authority. From this system we can avoid the misuse of our card by others and this system is highly secure with this system we can add, update, and delete the family members in to the ration network instantly. It is an automated process, manual intervention is less and there is no need of keeping an account of all purchased details in the notebook. All the details are stored in the database and the purchased details are notified to the consumers by sending an SMS to the family members. The purchased overall groceries are updated in the government database, so that this process will avoid corruption.
III. IMPLEMENTATION
From the above review study we are going to
implement finger print based ration management
system (fig.3), fingerprint recognition refers to the
automatic method of identifying or confirming the
identity of an individual based on the comparison of
two fingerprints [13]. Fingerprint recognition (fig.4)
is one of the most well known biometrics and it is by
far the most used biometric solution for
authentication on computerized systems.
The ration system is only based on the finger
print authentication. Each user must be authenticated
with finger print based ration card information, not
only user including shopkeeper also. First we store all
family members’ information with finger print and
photograph based authentication, so using this system
one of the family members can buy grocery items of
over ration card. The system must include the display
which must show the following information’s
Fig.3 Automatic rationing system
User 1
Card no.8975538244
Balance material: rice-20kg, oil-5 liter
Delivered material:12.35pm,06/2/2017
Available material in ration shop
Rice-100kg, oil-50litre, wheat-200kg
User 2
Invalid id
Fig.4 Finger print Recognition
IV. METHODS AND ALGORITHMS:
The existing conventional ration distribution
system has two basic issues one is renewing the
ration card every year and corruption done by the
employees by selling the grocery items in market
with less price .this can be overcome by using finger
print sensor and Google cloud messaging (GCM) is a
globally accepted standard for digital cellular
communication. This system can be implemented
with help of ADMEGA microcontroller [8].
A. AES Algorithm:
Advanced Encryption Standard Algorithm basically
supersedes the Data Encryption Standard (DES).
The algorithm runs in following steps:
(1) Derive the set of round keys from the cipher
key.
(2) Initialize the state array with the block data
(plaintext).
(3) Add the initial round key to the starting state
array.
(4) Perform nine rounds of state manipulation.
(5) Perform the tenth and final round of state
manipulation.
(6) Copy the final state array out as the encrypted
data (cipher text).
B. Automatic ration system using ADMEGA
microcontroller:
It has 8 Kb (fig.5) of Flash program memory
1Kbyte Internal SRAM I/O Ports: 23 I/ line can be
obtained from three ports; namely Port B, Port C and
Port D. T External Interrupt source, located at port D.
19 different interrupt vectors supporting 19 events
generated by internal peripherals.
Three Internal Timers are available, two 8 bit,
one 16 bit, offering various operating modes and
User
Finger print
verification
Ration
server
Buy
groceries Add
Update
Delete
With
finger print Database
2nd
International Conference on Engineering Innovations and Solutions (2'ICEIS – 2017)
Seventh Sense Research Group www.internationaljournalssrg.org Page 153
supporting internal or external clocking. (Serial
Peripheral interface) ATmega8 holds three
communication devices integrated. One of the most
powerful communication solutions is USART and
ATmega8 supports both synchronous and
asynchronous data transfer schemes.
Fig. 5 AGMEGA pin configuration
C. Finger Print Verification Algorithm
This Algorithm is used for the verification
purpose. It analyses (fig.6) the acquired finger print
image [15] with the stored finger print image which a
user already stored in the database and checks
whether the finger print matches or not. If the finger
print matches then the access is granted or else access
will be denied, by using this fingerprint matching
system we can provide the security from
unauthorized persons accessing the customers
information.
Fig.6 Finger print Matching
This fingerprint algorithm runs in following
steps, first the fingerprint was acquired by using the
reader and the image was processed by segmentation,
normalization, orientation estimation, ridge frequency
estimation, and binarization and thinning [11], [12].
The steps are as followed
i. Segmentation:
Segmentation is the process of separating the
foreground regions in the image from the background
region.
𝒗 𝒌 = 𝟏
𝒘𝟐 (𝑰 𝒊, 𝒋 − 𝑴(𝒌))
𝒘−𝟏
𝒋=𝟎
𝒘−𝟏
𝒊=𝟎
ii. Normalization
Normalization is used to standardize the intensity
values in an image by adjusting the range of grey-
level values so that it lies within a desired range of
values.
𝑵 𝒊, 𝒋 =
𝑴𝒐 + 𝑽𝒐(𝑰 𝒊, 𝒋 − 𝑴)𝟐
𝑽
𝑴𝒐 − 𝑽𝒐(𝑰 𝒊, 𝒋 − 𝑴)𝟐
𝑽
iii. Orientation Estimation
The orientation estimation is a fundamental
step in the future enhancement process as the
subsequent Gabor filtering stage relies on the local
orientation in order to effectively enhance the
fingerprint image.
𝒗𝒙 𝒊, 𝒋 = 𝟐𝝏𝒙(𝒖, 𝒗)𝝏𝒚(𝒖,𝒗)
𝒋+𝒘𝟐
𝒗=𝒋−𝒘𝟐
𝒊+𝒘𝟐
𝒖=𝒊−𝒘𝟐
𝒗𝒙 𝒊, 𝒋 = (𝝏𝒙𝟐 𝒖, 𝒗 𝝏𝒚
𝟐 𝒖, 𝒗 )
𝒋+𝒘𝟐
𝒗=𝒋−𝒘𝟐
𝒊+𝒘𝟐
𝒖=𝒊−𝒘𝟐
𝜽 𝒊, 𝒋 = 𝟏
𝟐𝒕𝒂𝒏−𝟏
𝒗𝒙(𝒊, 𝒋)
𝒗𝒚(𝒊, 𝒋)
iv. Ridge Frequency Estimation:
In addition to the orientation image, another
important parameter that is used in the construction of
the Gabor filter is the local ridge frequency. The
frequency image represents the local frequency of the
ridges in a fingerprint.
𝑭 𝒊, 𝒋 =𝟏
𝑺(𝒊, 𝒋)
v. Binarization:
Binarization is the process that converts a grey
level image into a binary image. This improves the
contrast between the ridges and valleys in a
fingerprint image, and consequently facilitates the
extraction of minutiae.
Not
Matches
Matches Access Granted
Access
Denied
2nd
International Conference on Engineering Innovations and Solutions (2'ICEIS – 2017)
Seventh Sense Research Group www.internationaljournalssrg.org Page 154
𝑬 𝒊, 𝒋 = 𝑮(𝒖, 𝒗, 𝟎 𝒊, 𝒋 , 𝒇(𝒊, 𝒋)
𝒘𝒚𝒍𝟐
𝒗𝒛−𝒘𝒚𝒍𝟐
𝒘𝒙𝒍𝟐
𝒚𝒛−𝒘𝒙𝒍𝟐
vi. Thinning:
Thinning is a morphological operation that
successively erodes away the foreground pixels until
they are one pixel wide.
𝒏𝟎 𝑻 = 𝒑(𝒊)
𝑵−𝟏
𝒊=𝑻
V. MESSAGE GENERATION SYSTEM
In this module we generate SMS to family
header phone, when the grocery items is purchased
from the ration shop the purchased information are
stored in database for future verification and also
send as an SMS to all the members of the family.
When ration staff update product Quantity in the
website that information also send as an SMS to all
the family in that region. GCM uses XMPP protocol
for message generation purpose. Where the XMPP
and HTTP are interconnected with the Google cloud
messaging server with the help of these two protocol
GCM server will send an SMS to the consumer’s
mobile.
Fig.7 Message Generation from PDS
VI. CONCLUSION
Fingerprint verification method is the most
popular method among all the biometrics methods for
identification/verification of a person. By using the
extraction algorithm and finger print verification
algorithm captured finger print image is scanned and
verified then the image undergoes several process
like segmentation, orientation, butrification and
thinning hence by doing all these process the finger
print of one person cannot be hacked by others and
this process is more secure than the previous works.
Hence we implemented this technology in this system
which portrays the Automation of the Public
Distribution System (PDS) and its recompense over
the present fair price shops. It will help the country's
economy to reach new heights. The automatic PDS is
easy to implement and requires much less hard work
when compared to the other system using of this
system we can avoid the malfunctions because there
is no manual operations. Now in a new system all
information is stored in database, so implementing
this will be really helpful to the people below poverty
line. In future this system can be implemented to the
Indian rationing system to lead our country in an
uncorrupted way. We can control the corruption
taking place in the PDS as this system is fully based
on finger print technology it is not as easier to view
and hack the details of other users and it is highly
secured.
ACKNOWLEDGMENT
It gives us a great pleasure to express my
boundless sense of gratitude to each and every person
who helped us with hand in completing this humble
piece of work. We wish to express our sincere thanks
to our honorable Chairman, Vice Chairman,
Principal, and I am grateful to extend my sincere
thanks to our beloved Head of the Department for
supporting us to lead this work in successful path.
REFERENCE
[1] Parvathy A, Venkata Rohit Raj, Venumadhav, Manikanta,
“RFID Based Exam Hall Maintenance /System’’, IJCA Special
Issue on “Artificial Intelligence Techniques - Novel Approaches &
Practical Applications” AIT, 2011
[2] Gyanendra K Verma, Pawan Tripathi, “A Digital Security
System with Door Lock System Using finger print Technology”,
International Journal of Computer Applications (IJCA) (0975 –
8887), Volume 5– No.11, August 2010
[3] Kumar Chaturvedula .U.P, “RFID Based Embedded System for
Vehicle Tracking and Prevention of Road Accidents”, International
Journal of Engineering Research & Technology (IJERT), Vol. 1
Issue 6, August – 2012, ISSN: 2278-0181.
[4]R.Ramani ,S. Selvaraju, S.Valarmathy, P.Niranjan, “Bank
Locker security System Based on RFID (finger print) and GSM
Technology”, International Journal of Computer Applications
(IJCA) (0975 – 8887) Volume 57– No.18, November 2012
[5] Swati R.Zope, Prof. Maruti Limkar, “RFID based Bill
Generation and Payment through Mobile”, International Journal of
Computer Science and Network (IJCSN) Volume 1, Issue 3, June
2012 www.ijcsn.org ISSN 2277-5420
2nd
International Conference on Engineering Innovations and Solutions (2'ICEIS – 2017)
Seventh Sense Research Group www.internationaljournalssrg.org Page 155
[6] Kumar Chaturvedula .U.P, “RFID Based Embedded System for
Vehicle Tracking and Prevention of Road Accidents”, International
Journal of Engineering Research & Technology (IJERT) Vol. 1
Issue 6, August - 2012 ISSN: 2278-0181
[7] J. Bringer,H.Chabanne, D. Pointcheval, and Q. Tang. Extended
private information retrievaland its application in biometrics finger
print authentications. In CANS,2007.
[8] N.Delvaux, H. Chabanne, J. Bringer,B.Kindarji, P. Lindeberg,
J. Midgren, J. Breebaart, T. Akkermans, M. vander Veen, R.
Veldhuis, E. Kindt, K. Simoens, C. Busch, P. Bours, D. Gafurov,
B. Yang, J. Stern, C. Rust, B. Cucinelli, and D. Skepastianos.
Pseudo idenitities based on fingerprint characteristics.
[9] S. Draper,A.Khisti, E. Martinian, A. Vetro, and J. Yedidia.
Using distributed source coding to secure fingerprint biometrics. In
Mitsubishi Electric Research Labs, 2007.
[10] Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar,
”Handbook of Fingerprint Recognition”, Springer-verlag, 2003, pp.
22-23.
[11]Fingerprint Identification System Based On Neural Network
Mr. Lokhande S.K., Prof. Mrs. Dhongde V.S. ME (VLSI &
Embedded Systems), Vishwabharati Academy’s College of
Engineering, Ahmednagar (MS), India.
[12] Overview of fingerprint recognition system, Mouad. M. H.
Ali; Vivek H. Mahale; Pravin Yannawar; A. T. Gaikwad. 2016
International Conference on Electrical, Electronics, and
Optimization Techniques (ICEEOT)
[13] A survey on fingerprint biometric recognition system, Varsha
J. Rathod; Nalini C. Iyer; Meena S M, 2015 International
Conference on Green Computing and Internet of Things
(ICGCIoT)
[14] A Study of Biometric Approach Using Fingerprint
Recognition Ravi Subban and Dattatreya P. Mankame
[15] Template security for fingerprint recognition System with two
variables polynomial of fuzzy vault for minutiae points
Mahananda. D.Malkauthekar 2015 International Conference on
Communications and Signal Processing (ICCSP)