Technical Seminar Sample
Technical Seminar Sample
Bachelor of Technology
In
COMPUTER SCIENCE AND ENGINEERING
Submitted by
NAME – ROLL NUMBER
1
MALLA REDDY INSTITUTE OF TECHNOLOGY
(Sponsored by Malla Reddy Educational Society)
Accredited by NBA, Certificated by ISO 9001:2015
Approved by AICTE & Affiliated to JNTU, Hyderabad
Maisammaguda, Dhulapally Post, (Via: Kompally), Secunderabad - 500100.
CERTIFICATE
This is to certify that Technical Seminar Report entitled “xxxxxxxx title of Technical Seminar
xxxxxxxxxxx” is a bonafide work carried by XXXXXXname1, (Roll no)XXXXX, of
COMPUTER SCIENCE AND ENGINEERING DEPARTMENT in MALLA REDDY
INSTITUTE OF TECHNOLOGY and submitted to JNTU, Hyderabad in the partial
fulfillment of the requirement for the award of BACHELOR OF TECHNOLOGY.
2
ABSTRACT
This biometrics project focuses on fingerprint recognition and how such a system would be
implemented. If implemented in our laboratory, this system would confirm or deny the identity
of each individual attempting to gain access to the lab area with a given amount of precision. The
scanner that will be used in this project is the Microsoft Fingerprint Reader. The primary
problem in using this particular scanner comes from the security features Microsoft incorporates.
The signal caring all the information from the fingerprint scan is encrypted, and the biggest
challenge will come from deciphering this signal. Another major challenge of this project will
understand the methods used to analyze the information from the scan. There are several
different methods including Fourier Exponential Series and Principle Component Analysis, but
cutting edge systems rely on information stored with wavelets to analyze and compare scans. If
this project is a success, the lab will benefit from the security and understanding of modern
fingerprint recognition. Fingerprint scanners have unique patterns that can be used to distinguish
one scanner from another one. The pattern, which we call scanner pattern, stems from the
variability of device characteristics at silicon level and is caused by imperfections of the
conversion from the input to the scanner (i.e., the object applied to it) to its output (i.e., the
digital image). The scanner pattern is a sufficiently unique and persistent intrinsic characteristic
of the fingerprint scanners even to those of the same technology, manufacturer, and model.
3
CONTENTS:
1. Introduction 5
2. Historical overview 6
3. Techniques used in Fingerprint 7
4. Applications 12
5. Present and Future of Fingerprint Recognition 12
6. Advantages 13
7. Limitations 14
8. Conclusion 15
4
INTRODUCTION:
Along of various biometrics techniques, in the past few decades’ human-beings have been
addicted to various technologies such as captured photos, scanned signatures, bar code systems,
verification Id & so on. Also, Biometrics is one of the applications in Image processing which
refers to technologies that used physiological or behavioral characteristics of human body for the
user authentication. The biometric authentication system based on two modes: Enrolment and
Recognition. In the enrolment mode, the biometric data is acquired from the sensor and stored in
a database along with the person’s identity for the recognition. In the recognition mode, the
biometric data is re-acquired from the sensor and compared to the stored data to determine the
user identity. Biometric recognition based on uniqueness and permanence. The uniqueness
means that there is no similarity of feature between two different biometrics data. For example,
there are no two humans having the same fingerprint feature even if they are twins. And when
the features of biometrics do not change over the lifetime or aging, it is called permanence.
Biometrics can have physiological or behavioral characteristics. The physiological characteristics
are included in the physical part of body such as (fingerprint, palm print, iris, face, DNA, hand
geometry, retina… etc).
The behavioral characteristics are based on an action taken by a person such as (Voice
recognition, keystroke-scan, and signature-scan). Any biometrics system including two phases
first phase is enrollment phase and second is recognition phase. The recognition phase divided to
two things which is verification and identification. During the enrollment phase the biometrics
data are captured and generate digital image then Pre-processing apply to digital image for
removing unwanted data and apply the post- processing than store this data in database. In the
case of identification process the fingerprint acquired from one person is compared with all the
fingerprints which store in database. Also it is known as (1: N) matching. it is used in the process
of seeking the criminals. In the verification process the persons fingerprint is verified from the
database by using matching algorithms. Also, it is known as (1:1) Matching. It is the comparison
of a claimant fingerprint against enroll fingerprint, initially the person enrolls his/her fingerprint
into verification system, and the result show whether the fingerprint which take from the user is
matching with the fingerprint store as a template in database or not match.
5
HISTORICAL OVERVIEW:
While the earliest accounts of biometrics can be dated as far back as 500BC in Babylonian
empire, the first record of a biometric identification system was in 1800s, Paris, France.
Alphonse Bertillon developed a method of specific body measurements for the classification and
comparison of criminals. While this system was far from perfect, it got the ball rolling on using
unique biological characteristics to authenticate identity.
Fingerprinting followed suite in the 1880s, not only as a means of identifying criminals but also
as a form of signature on contracts. It was recognized that a fingerprint was symbolic of a
person’s identity, and one could be held accountable by it. Through there are debates on who
exactly instigated fingerprinting for identification, Edward Henry is denoted for the development
of a fingerprinting standard called the Henry Classification System.
This was the first system for identification based on the unique architectures of fingerprints. The
system was quickly adopted by law enforcement replacing Bertillon’s methods becoming the
standard for criminal identification. This began a century’s worth of research on what
other unique physiological characteristics could be used for identification.
6
TECHNIQUES USED IN FINGERPRINT:
i) Core detection
The core is defined as a singular point in a fingerprint image that exhibits the maximum
ridge line curvature
We need to normalize the displacement and the rotation between the registered
fingerprint and the input fingerprint in order to perform the high accuracy fingerprint matching
Next step is to extract the overlapped region (intersection) of the two images we examine
the n1-axis projection and the n2-axis projection of pixel values. Only the common effective
image areas, with the same size are extracted
7
We calculate the BLPOC function between the two extracted images and, and evaluate
the matching score. The BLPOC function may give multiple correlation peaks due to elastic
fingerprint deformation. Thus, we define the matching score between the two images as the sum
of the highest two peaks of the BLPOC function.
Binarization: Binarization converts gray scale image into binary image by fixing the
threshold value. The pixel values above and below the threshold are set to ‘1’ and ‘0’
respectively.
8
Block Filter:
o The binarized image is thinned using Block Filter to reduce the thickness of all ridge
lines to a single pixel width to extract minutiae points effectively.
Minutiae Extraction:
The minutiae location and the minutiae angles are derived after minutiae extraction.
The terminations which lie at the outer boundaries are not considered as minutiae points, and
Crossing Number is used to locate the minutiae points in fingerprint image.
Crossing Number is defined as half of the sum of differences between intensity values of two
adjacent pixels.
If crossing Number is 1, 2 and 3 or greater than 3 then minutiae points are classified as
Termination, Normal ridge and Bifurcation respectively
9
10
Minutiae Matching:
To compare the input fingerprint data with the template data Minutiae matching is used.
For efficient matching process, the extracted data is stored in the matrix format.
o Number of columns: 4
o Column 4: Type of minutia. (A value of ‘1’ is assigned for termination, and ‘3’ is
assigned for bifurcation).
11
APPLICATIONS:
Fingerprint based biometrics has primarily been used to secure entry devices for building
door locks and computer network access.
A small number of banks use fingerprint readers for authorization at ATMs.
Grocery stores are experimenting with a fingerprint scan checkout that automatically
recognizes and bills a registered user’s credit card or debit account.
More recent applications of finger recognition include use of fingerprints for voter
registration.
Today, fingerprint recognition technology is used for security purposes, to restrict assess
or to protect computers.
As fingerprint recognition technology develops, it is expected that more affordable and
more portable fingerprint recognition devices will become available, and finger-print
recognition will be considered a safe and convenient personal identification system.
Eventually, fingerprint recognition will be used to secure the safety and reliability of a
variety of businesses in the industrial sector, including the personal devices and financial
industry.
12
ADVANTAGES:
In public locations such as banks and airports a large number of people transit every day
including known criminals. Face recognition systems attached to video surveillance
systems are supposed to help catch them.
Fairly small storage space is required for the biometric template, reducing the size of the
database required.
It is one of the most developed biometrics, with more history, research, and design.
Each and every fingerprint including all the figures are unique, even identical twins have
different fingerprints.
Sound potential for enrich use as most of the countries have existing fingerprint
databases.
13
LIMITATIONS:
Any time data loose in database high effect for security mechanism.
It highly expensive
14
CONCLUSION:
Biometry allows the automatic user authentication sensor using his physiological or behavioral
characteristics increasing the system security level. The biometric sensor constitutes a valid
alternative respect the “conventional” authentication systems, based on traditional authentication
methods (like password and PIN). The modern biometric sensors are less expensive and also
more miniaturized, and this allows an easier diffusion of biometric authentication systems.
Besides the biometry is an effective strategy for the privacy protection. Finally, biometric
sensors, in the future, will can be used in almost every transaction that needs secure personal
authentication.
15