Beruflich Dokumente
Kultur Dokumente
SYSTEM
PROJECT SUPERVISOR
PROJECT LEADER
AMMAD UDDIN
MEMBERS
AMEER ULLAH
RUMMAN KHAN
MUHAMMAD SHAKEEL
1
INTRODUCTION
INTRODUCTION
2
1.2 What is biometrics?
Biometrics based security systems are far most secure and accurate
than traditional password or token based security systems. For example a
password based security system has always the threat of being stolen and
accessed by the unauthorized user. Further more the traditional security
systems are always prone to accuracy as compared to biometrics which is
more accurate.
Traditional security systems face the problem that they don’t give
solution to the problem of individuals having multiple IDs. For examples a
person having multiple passports to enter a foreign country. Thanks to
biometrics!!! They give us a system in which an individual can’t possess
multiple IDs and can’t change his ID through out his life time. Each individual
is identified through a unique Biometric identity throughout the world.
3
1.4.1 Physical biometrics
• Fingerprints
• Face
• Hand geometry
• Iris scans
Fingerprints
Fingerprints recognition has been present for a few hundred years. Due
to tremendous research this field has reached such a point where the
purchase of fingerprint security system is quite affordable. For this reason
these systems are becoming more widespread in a variety of applications.
Fingerprint image.
Face
4
current research involves developing more robust approaches that accounts
for changes in lighting, expression, and aging, where potential variations for
a given person are illustrated in Figure. Also, other problem areas being
investigated include dealing with glasses, facial hair, and makeup.
Facial Expression Image
Hand geometry
As seen in this image, the physical size of the scanner limits its
application in portable devices. The primary advantage of hand geometry
systems is that they are simple and inexpensive to use. Also, poor weather
and individual anomalies such as dry skin or cuts along the hand do not
appear to negatively affect the system. The geometry of the hand, however,
is not a very distinctive quality. In addition, wearing jewelry or other items on
the fingers may adversely affect the system’s performance.
5
Iris
Iris pattern
• Gait
6
• Handwriting
• Speech
• Signature
Gait
• DNA
• Blood glucose
1.5.1 Multimodal
7
Multimodal systems employ more than one biometric recognition
technique to arrive at a final decision. These systems may be necessary to
ensure accurate performance. Combining several biometrics in one system
allows for improved performance as each individual biometric has its own
strengths and weaknesses. Using more than one biometric also provides
more diversity in cases where it is not possible to obtain a particular
characteristic for a person at a given time. Although acquiring more
measurements increases the cost and computational requirements, the extra
data allows for much greater performance.
1.5.2 Multialgorithmic
These techniques acquire a single sample from one sensor and process
this signal with two or more different algorithms.
1.5.3 Multi-instance
1.5.4 Multi-sensorial
8
These systems sample the same biometric trait with two or more
different sensors, such as scanning a fingerprint using both optical and
capacitance scanners.
Multi-biometric categories
FINGERPRINT
IENTIFICATION
9
SYSTEM
Fingerprint Identification system
10
operational productivity among law enforcement agencies. At the same time,
the automated systems reduced funding requirements to hire and train
human fingerprint experts. Today, automatic fingerprint recognition
technology can be found in a wide range of civilian applications.
11
A fingerprint pattern is composed of a sequence of ridges and valleys.
In a fingerprint image, the ridges appear as dark lines while the valleys are
the light areas between the ridges. A cut or burn to a finger does not affect
the underlying ridge structure, and the original pattern will be reproduced
when new skin grows. Ridges and valleys generally run parallel to each
other, and their patterns can be analyzed on a global and local level.
Ridges and valleys generally run parallel to each other, and their
patterns can be analyzed on a global and local level.
At the global level, the fingerprint image will have one or more regions
where the ridge lines have a distinctive shape.
12
Ridge Types
13
Minutiae Types (Terminations and Bifurcations)
Two main approaches are used for fingerprint matching which are
described below.
14
SYSTEM DESIGN
15
3.1 System Level Design
To implement our project a four stage approach has been used. These
four stages are given in the figure below.
Preprocessing
• Image enhancement
• Image Binarization
• Image segmentation
Minutiae Extraction
• Thinning
• Minutiae marking
16
Post-processing
• False minutiae
removal
Minutiae Matching
Figure. Project
17
FINGERPRINT IMAGE
PROCESSINGS
18
Histogram equalization is used to expand the pixels to all the intensity
values from 0 to 255. Some of the original images are very dark i.e. their
histogram is such that their intensity values are concentrated towards the
origin i.e. near zero intensity value. On the other hand some of the images
are very bright i.e. their intensity values are concentrated towards 255 and
nearby intensity values. After applying the histogram equalization the pixels
are distributed uniformly all over the intensity values from 0 to 255. Due to
this process the contrast of the image is increased and so the visual effect of
the image is increased.
2000
1800
1600
1400
1200
1000
800
600
400
200
3000
2500
2000
1500
1000
500
19
0
Fingerprint image
Before Histogram Equalization
Fingerprint image
After Histogram Equalization
20
the operation, ridges in the fingerprint are highlighted with black color while
furrows are white.
Fingerprint
image before
Binarization.
Figure.
Fingerprint
image after
Binarization
21
Fingerprint image segmentation
22
MINUTIAE MATCHING
23
3 one-value neighbors, then the central pixel is a ridge branch as shown in
figure. If the central pixel is 1 and has only 1 one-value neighbor, then the
central pixel is a ridge ending shown in figure below.
0 1 0 0 0 0
0 1 0 0 1 0
1 0 1 0 0 1
Bifurcation Termination
Post processing mainly involves removal of the false minutiae from the
fingerprint image.
As described earlier, the crossing number algorithm is used again to
locate the terminations and bifurcations within the final thinned image. In
this process, the locations where the ridges end at the outer boundaries of
the image are classified as terminations. In the true sense, however, these
locations are not unique termination minutiae. Instead, they only appear as
terminations because the dimensions of the image force each ridge to come
to an end. Knowing this, these locations should not be recorded as minutiae
within the fingerprint. One way to eliminate such locations involves creating
an ellipse to only select minutiae points inside the fingerprint image.
24
The center of the ellipse is established by locating the minimum and
maximum rows and columns that contain a ridge pixel, then calculating the
row and column that lie halfway between these extremes.
25
PASSWORD SECURITY
26
Password Security
Password?
2. When a user wants to enter the system he must enter the password
to get access.
5. If the password does not matches with any of the passwords stored
in the array then an unmatched messages is displayed and access is not
granted to the user.
27
In our project the Password security works and is presented in the
following way as shown in different figures.
a). when the user enters the Enter Password button a dialogue box
appears asking the user to enter password.
Password GUI 1
28
b). when the user enters the password and presses OK on the dialogue
box another dialogue box appears showing whether the password is matched
or not.
Password GUI 2
29
SYSTEM GUI AND ITS
USER MANUAL
30
7.1 GUI User Manual
31
The following window will appear when we press enter in the above
figure.
There are three main panels in the main window as shown in the above
figure. There is a control panel, view panel and exit panel. Control panel have
two buttons of which match images is of main importance. The view panel
shows different buttons used for performing different operations on the two
images.
32
3. From the file menu click open and load two images as show in the
figure below.
4. After loading the two images we can view the images by clicking on
the view images button in the view panel as show below.
33
GUI View Images
34
Transformed Images
35
Histogram of Original Images
36
7. Click on the Hist Equalization to view the equalized histogram of
the two images as shown below.
8. when we click the match images, it compares the two images and
displays the result. If the two fingerprint images match then a
message box is shown showing “Fingerprint matched”, otherwise
37
the message box displays “Fingerprint don’t match” as shown
below.
38
Password Matching Result
39
CONCLUSION
Conclusion
Future work
Following are the some of the recommendations and future work that
can be done in order to enhance the system further.
1. There is a need in fingerprint security system to detect
whether the fingerprint is from a living user or not.
Experiments have shown that fingerprint security systems can
be fooled by using copy of the fingerprint from a user.
40