0% found this document useful (0 votes)
29 views20 pages

Nis A&b

The micro-project focuses on developing a biometric authentication system using fingerprint and face recognition to enhance security and user convenience. It aims to replace traditional password-based authentication methods, ensuring a reliable and efficient mechanism for secure access control. The project includes a detailed action plan, resource requirements, and highlights the advantages and disadvantages of biometric authentication methods.

Uploaded by

awatemanthan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views20 pages

Nis A&b

The micro-project focuses on developing a biometric authentication system using fingerprint and face recognition to enhance security and user convenience. It aims to replace traditional password-based authentication methods, ensuring a reliable and efficient mechanism for secure access control. The project includes a detailed action plan, resource requirements, and highlights the advantages and disadvantages of biometric authentication methods.

Uploaded by

awatemanthan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

MUCHHALA POLYTECHNIC

BRANCH : IF6I
SUBJECT: NIS

Title Of Micro-Project:
GROUP MEMBERS

ROLL NO CLASS NAME OF MEMBER


IF6I Alisha ansari
3541
IF6I Swetal bibvekar
3541
IF6I Krishna Nikam
3543
IF6I Jayesh Chaudhari
3544
IF6I Ashish Tiwari
3545

GUIDE NAME: - Rashmi Bhatiya


Part A
Plan
Title Of Micro-Project:
Brief Description:
 This micro-project focuses on biometric authentication using
fingerprint and face recognition.
 It aims to enhance security by verifying users based on their
unique biometric traits.
 The system reduces risks associated with traditional
password-based authentication.
 The project demonstrates the effectiveness of biometrics for
secure access control.
Aim of the Micro-Project:
 To develop a biometric authentication system using fingerprint
and face recognition.
 To enhance security by replacing or supplementing password-
based authentication.
 To ensure a reliable, efficient, and user-friendly authentication
mechanism.
 To apply biometric techniques in secure login systems, access
control, and identity verification.
Action Plan: -
Plan Plan
Name Of
Sr No Detail Of Activities Start End
Team
Date Date
Members
Group formed according to
roll no & group leaders
Done by all
1 were elected also detailed
members
information on micro project
was given

Jayesh
Finalization of microproject as
2 Chaudhari,krish
well as detailed discussion
na nikam
regarding topic

Done by all
Planning of micro-project members
regarding, resources,
3 software used, submission
date and completing part a
plan of micro – project

Jayesh Chaudhari

Complete analysis of
4 design part of micro-
project & distribution of
module among group
members
Krishna nikam

5 Getting it finalized by the


guide
Krishna nikam,
Implementation of Project Jayesh Chaudhari
6
report

Done by all
Presentation of 1 part of micro-
st
members
project Infront of guide by
7
each group member and
Preparing of part b plan for
micro-project
Krishna
8 Submission of micro-project nikam,jayesh
Chaudhari
Resources used: -

Name Of
Resources Specification Quantity Remarks
Sr No
Required

HP laptop ryzen 5
1 Computer system 1 -
5600h 8GB RAM

2 Operating system Windows 11,64bit 1 -

Internet/Google
3 5G 1 -
Chrome

4 Software VS Code 1 -
PART B
Aim Of The Project:
The aim of this micro-project is to develop a biometric
authentication system using fingerprint and face
recognition. It enhances security by replacing or
supplementing traditional password-based authentication.
The project ensures a reliable, efficient, and user-friendly
authentication method while applying biometric techniques
for secure login, access control, and identity verification.

Brief Description:
 This micro-project focuses on biometric authentication using
fingerprint and face recognition.
 It aims to enhance security by verifying users based on their
unique biometric traits.
 The system reduces risks associated with traditional
password-based authentication.
 The project demonstrates the effectiveness of biometrics for
secure access control.

Aim Of Micro Project:


 To develop a biometric authentication system using fingerprint
and face recognition.
 To enhance security by replacing or supplementing password-
based authentication.
 To ensure a reliable, efficient, and user-friendly authentication
mechanism.
 To apply biometric techniques in secure login systems, access
control, and identity verification.
Biometric Authentication
Biometric authentication is a security process that
verifies identity using unique biological traits like
fingerprints, facial features, iris patterns, and voice
recognition. It enhances security by allowing only
authorized individuals to access sensitive systems,
data, or locations.

Key Features of Biometric Authentication:


 Uniqueness: Every person has distinct
biometric traits that cannot be easily
replicated.
 Convenience: Eliminates the need to
remember passwords or carry access
cards.
 Security: Provides a more secure
alternative to traditional authentication
methods.
Common Types of Biometric Authentication:
 Fingerprint Recognition – Scans and
matches fingerprints for identity
verification.
 Face Recognition – Identifies individuals based on
facial features.
 Iris and Retina Scanning – Uses unique eye patterns
for authentication.
Biometric authentication is widely used in
smartphones, banking, security systems,
healthcare, and government applications to
enhance access control and protect user data.
Fingerprint Authentication
Fingerprint authentication is a biometric security method
that verifies a person’s identity using their unique
fingerprint patterns. Since no two individuals have the same
fingerprints, this technology provides a high level of
security and accuracy. It is widely used in smartphones,
banking systems, office access control, and government
identification programs. Fingerprint recognition offers a
quick and efficient way to authenticate users, reducing
reliance on passwords and PINs.

 Advantages of Fingerprint Authentication:


 High Accuracy and Uniqueness: Each person has a
unique fingerprint, making it a highly secure
authentication method.
 Fast and Convenient: Scanning a fingerprint takes only
a few seconds, providing quick access without
remembering passwords.
 Difficult to Forge: Unlike passwords or PINs,
fingerprints cannot be easily duplicated or shared.
 Cost-Effective: Many modern devices come with built-in
fingerprint sensors, reducing additional hardware
costs.
 Minimal User Effort: Users only need to place their
finger on a scanner, making authentication simple and
hassle-free.
 Improved Security: Reduces risks associated with
stolen passwords or lost access cards.

 Disadvantages of Fingerprint Authentication:


 Potential Recognition Issues: Dirty, wet, or injured
fingers may lead to authentication failures.
 Privacy and Security Concerns: Fingerprint data, if not
properly encrypted, can be misused or hacked.
 Hardware Limitations: Some fingerprint sensors may
not work well in extreme conditions, such as cold
weather or with sweaty fingers.
 Not 100% Foolproof: Advanced techniques like fake
fingerprint molds can sometimes bypass sensors.
 Data Storage Risks: Storing fingerprint data requires
strong encryption to prevent unauthorized access or
leaks.
 Uses of Fingerprint Authentication:
Fingerprint authentication is widely used in various fields,
including:
 Smartphones and Devices: Unlocking phones, securing
mobile payments, and app authentication.
 Banking and Finance: Secure transactions, ATM
authentication, and mobile banking logins.
 Workplace Security: Employee attendance systems and
restricted area access.
 Government and Law Enforcement: Passport
verification, criminal identification, and national ID
programs.
 Healthcare: Patient record access and medical
data security.

 Importance of Fingerprint Authentication:


Fingerprint authentication is crucial in today’s digital world as
it provides a secure and reliable way to verify identity. It
eliminates the risks associated with forgotten passwords
and stolen credentials. By integrating fingerprint
recognition into security systems, businesses and
individuals can enhance data protection, prevent fraud, and
improve user experience. Its widespread adoption
highlights its effectiveness in modern security applications.
Face Recognition

 Brief Description of Face Recognition Authentication


Face recognition authentication is a biometric
technology that identifies and verifies individuals
based on their facial features. It captures an image
of a person’s face and compares it with stored data
using advanced algorithms.
This method is widely used in smartphones,
security surveillance, banking, and government
identification systems. Face recognition is gaining
popularity due to its non-intrusive nature, making
authentication seamless and user-friendly.

 Advantages of Face Recognition Authentication:


 High Convenience: Users can be authenticated
without physical contact, making it more
hygienic and effortless.
 Fast and Efficient: The system quickly scans
and verifies faces, providing instant
access.
 Difficult to Replicate: Unlike passwords or ID
cards, facial features are unique and hard to
forge.
 Automated and Scalable: Can be integrated into
large security systems, such as airports and
public surveillance.
 Works from a Distance: Unlike fingerprint
authentication, users do not need to touch a
scanner, making it useful for contactless
verification.
 Multi-Factor Security: Can be combined with
other authentication methods for enhanced
security.

 Disadvantages of Face Recognition Authentication:


 Accuracy Issues: Poor lighting, facial
expressions, glasses, masks, or changes in
appearance (e.g., beard growth) can affect
recognition.
 Privacy Concerns: Storing and using facial data
raises privacy and ethical concerns regarding
data security.
 Potential for Spoofing: Advanced techniques, such
as deepfake technology or high-resolution
photos, may trick some face recognition
systems.
 High Computational Requirements: Requires
powerful hardware and advanced AI
algorithms for accurate identification.
 Legal and Ethical Issues: Some countries have
strict regulations on the use of face
recognition in public spaces.
 Uses of Face Recognition Authentication:
Face recognition is widely used in various
applications, including:
 Smartphones and Devices: Unlocking phones,
secure app authentication, and mobile
payments.
 Security and Surveillance: Monitoring public
places, identifying suspects, and access
control in buildings.
 Banking and Finance: Facial verification for
secure transactions and fraud prevention.
 Healthcare: Patient identity verification and
restricted access to medical records.
 Airports and Travel: Automated passport control
and boarding procedures for faster check-
ins.
 Importance of Face Recognition Authentication:
Face recognition plays a crucial role in modern
security and authentication systems. It offers a
seamless, contactless, and efficient way to verify
identities while reducing dependency on
passwords. Its widespread adoption in smartphones,
banking, and surveillance demonstrates its
effectiveness in enhancing security and user
experience.
As AI technology advances, face recognition is
expected to
become even more accurate and reliable for various
applications.
Program:-
// Function to handle biometric authentication
Future<void> _authenticateWithBiometrics() async
{ try {
bool canAuthenticate = await
_localAuth.canCheckBiometrics || await
_localAuth.isDeviceSupported();

if (canAuthenticate) {
bool isAuthenticated = await
_localAuth.authenticate( localizedReason: 'Scan your
fingerprint to log in', options: AuthenticationOptions(
biometricOnly: true, // Ensures only biometric
authentication is used
stickyAuth: true,
useErrorDialogs: true, // Shows system error dialogs
),
);

if (isAuthenticated) {
final storedPassword = await _storage.read(key:
'password');
final storedUsername = await _storage.read(key:
'username');
if (storedPassword != null && storedUsername != null)
{
Navigator.pushReplacement( contex
t,
MaterialPageRoute(builder: (context) =>
PasswordManagerHome()),
);
}
} else {
ScaffoldMessenger.of(context).showSnackBar( Sn
ackBar(content: Text('Authentication failed')),
);
}
} else {
ScaffoldMessenger.of(context).showSnackBar(
SnackBar(content: Text('Biometric authentication is
not available')),
);
}
} on PlatformException catch (e) {
ScaffoldMessenger.of(context).showSnackBar( S
nackBar(content: Text('Error: ${e.message}')),
);
}
}
Code explanation:-
The `authenticateWithBiometrics()` function in Flutter
checks if biometric authentication (fingerprint or face
recognition) is available and, if so, prompts the user to
authenticate. If authentication is successful, it retrieves the
stored username and password from secure storage and
navigates to the `PasswordManagerHome` screen. If
biometrics are unavailable or authentication fails, it
displays an appropriate message using a `SnackBar`. The
function ensures only biometric authentication is used
(`biometricOnly: true`) and handles errors gracefully using
a `try-catch` block to catch `PlatformException`. This
provides a secure and user-friendly way to log in without
manually entering credentials. / '.¸7˙½•

Output:-

Fingerprint Authentication Face Recognition


Course Outcome Integrated:
CO1: Understand Security Mechanisms – Demonstrates
knowledge of biometric authentication as a security
mechanism for user verification.
CO2: Implement Secure Authentication Techniques –
Applies biometric authentication (fingerprint/face
recognition) to enhance access control in applications.
CO3: Use Cryptographic and Secure Storage Methods –
Ensures secure handling of user credentials using
encrypted storage techniques.
CO4: Develop Secure Network Applications – Implements
biometric-based login in a real-world application, improving
security and usability.
CO5: Analyze and Mitigate Security Threats – Addresses
security challenges like spoofing and unauthorized access
through biometric authentication.
Actual Procedure Followed:
1. Group-Formation: Group Formation is done by subject
teacher .
2. Finalization Of Micro-Project: -Done by all group member.
3. Planning: - Done by All group Member.
4. Module Distribution & Analysis Part: - Done by Jayesh
Chaudhari, Krishna Nikam.
5. Design Part: - done by Jayesh Chaudhari, Krishna Nikam
6. Implementation: - Done by Krishna Nikamand jayesh
Chaudhari
7. Presentation: - Done by all group member
8. Submission: - Done by all group member

Actual Resources Used:

Name Of
Sr Resources Specification Quantity Remarks
No Required

HP laptop ryzen
Computer
1 5 5600h, 8 GB 1 -
System
RAM

Operating Windows 11, 64


2 1 -
System bit

IntelliJ IDEA,
3 Software 1 -
Microsoft word
Conclusion :
The biometric authentication project successfully enhances
security by implementing fingerprint and face recognition
for user verification. It eliminates the need for traditional
passwords, reducing the risk of credential theft and
unauthorized access. Secure storage techniques ensure
that sensitive user data remains protected. By integrating
biometric authentication, the project demonstrates a real-
world application of secure access control, improving both
security and user convenience. This approach aligns with
modern cybersecurity practices, making authentication
more reliable and efficient. / '.¸7•˙½

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy