Sie sind auf Seite 1von 6

Global Journal of Advanced Engineering Technologies, Vol1,Issue3-2012 ISSN : 2277-6370

A Secured Approach for Authentication System


using Fingerprint and Iris
D.Shekar Goud (1) Ishaq Md (2) PJ.Saritha(3)
1
P.G. Student (Embedded Systems), ELEN, Patancheru, India.
2
P.G. Student (Embedded Systems), ELEN, Patancheru, India.
3
Associate Professor, ECE Department, ELEN, Patancheru, India.

Abstract-- Authentication is a fundamental issue to any trust- matching and Iris recognition. A biometric system is
oriented computing system and also a critical part in many essentially a pattern recognition [4] system which makes a
security protocols. In addition, authentication also serves as personal identification by determining the authenticity of a
the first step for many other security purposes, such as key specific physiological or behavioural characteristics possessed
management and secure group communication [5]. by the user. Depending on the context, a biometric system can
Passwords or smartcards have been the most widely used be either a verification (authentication) [8] system or an
authentication methods due to easy implementation and identification system. The current security model for
replacement; however, memorizing a password or verification of identity, protection of information and
carrying a smartcard, or managing multiple authentication to access data or services is based on using a
passwords/smartcards for different systems (one for each token or password, tied to and thereby representing an
system),is a significant overhead to users. In addition, they individual to either authenticate identity or allow access to
are artificially associated with users and cannot truly information [Annet al, 2007]. This token may be password or
identify individuals Performing authentication is notoriously shared secret (something you know), an identity card
difficult. Biometrics has been widely used and adopted as a (something you have) or biometric (something you are). In all
promising authentication [8] method due to its advantages over this cases, the details of the token are held by a third party
some existing methods, particularly, its resistance to losses whose functions is to authorizes and at times allow the
incurred by theft of passwords and smart cards. However, transaction to proceed if the details of an individual’s token
biometrics introduces its own challenges, Such as being match those stored in a database.
irreplaceable once compromised. Biometrics can be used to
By using biometrics it is possible to establish an identity
prevent unauthorized access to ATMs, cellular phones, smart
cards, desktop PCs, workstations, and computer networks. It can based on who you are, rather than by what you possess, such
be used during transactions conducted via telephone and internet as an ID card, or what you remember, such as a password.
(electronic commerce and electronic banking). In some applications, biometrics may be used to supplement
ID cards and passwords thereby imparting an additional level
Keywords: ARM7 (LPC2148), RFID, Fingerprint module, pc cam, of security. Such an arrangement is often called a dual-factor
keypad, buzzer, DC motor authentication scheme.
1. INTRODUCTION 1.1 EXISTING SYSTEM

Biometrics refers to the automatic identification of a person Present in existing system the person who ever wants to
based on his/her physiological or behavioural characteristics. access his things or take his amount from Bank Lockers or
This method of identification [1] is preferred over traditional ATM,s first of all he has to show his id card in front of the
methods involving passwords and PIN numbers for various card accessing machine. If the card is valid then he wants to
reasons: the person to be identified is required to be physically enter the password in a particular machine. If the password is
present at the point-of identification; identification based on correct then only the locker system will be opened otherwise
biometric techniques obviates the need to remember a it will not be opened, or he can draw the amount from
password or carry a token. With the increased use of particular machine. So likewise the person can access his
computers as vehicles of information technology, it is things from bank lockers.
necessary to restrict access to sensitive/personal data. By Not only in banking systems for suppose in military areas
replacing PINs, biometric techniques can potentially prevent also only authorized persons have to enter in that secure area
unauthorized access [8] to or fraudulent use of ATMs, cellular that means the area will be restricted. The authorized persons
phones, smart cards, desktop PCs, workstations, and computer those who wants enter in that restricted area first of all he
networks. PINs and passwords may be forgotten, and token wants to show his id card in front of the card accessing
based methods of identification like passports and driver's machine, if it is valid card then the person will have to enter
licenses may be forged, stolen, or lost. Thus biometric the password, if it is valid password then only the door will be
systems of identification are enjoying a renewed interest. opened otherwise it will not be opened.
Various types of biometric systems [1] are being used for real-
time identification; the most popular are based on fingerprint

170
Global Journal of Advanced Engineering Technologies, Vol1,Issue3-2012
Vol1,Issue3 ISSN : 2277-6370

1.2 DISADVANTAGES OF EXISTING SYSTEM pattern. The captured image is called a live scan. This live
• If the person’s ID card and the password are stolen by his scan is digitally processed to create a biometric template (a
colleagues or family members then the things will be stolen in collection of extracted features)) which is stored and used for
the existing system. matching.
By using authorized person’s identity card some other person
•By 4) Keys Section: With the help of these keys the users can
will enter in that particular authorized areas or restricted area enrol their Finger prints and they will
w enter the password.
in military. 5) PC Cam Section: This section is basically meant to capture
the IRIS of the persons and to transfer this captured IRIS for
2. PROPOSED SYSTEM STRUCTURE AND PROTOTYPE Processing.
DESIGN 6) IRIS: In this we are using the Iris recognition technique.
Iris recognition analyses the features that exist in the colored
tissue surrounding the pupil, which has 250 points used for
comparison, including rings, furrows, and freckles. Iris
recognition uses a regular video camera system and can be
done from further away than a retinal scan. It has the ability to
create an accurate enough measurement that can be used for
Identification purposes, not just verification.
7) Buzzer: This is the output device which we are using to
indicate the unauthorized person.
8) LOCKER SYSTEM: Here we are demonstrating demo a DC
motor as the Locker for the authorized persons in the Locker
system mode.
B. Building the Prototype System
Initially the users will enrol their fingerprints
finge and eye
images that will be saved in the data base. Figure1 shows the
block diagram of the project.
Step1: The he person who ever wants
want to access his things or take
his amount from Bank Lockers or ATM,s first of all he wants
to show his id card in front of the card accessing machine i.e
reader.. If it is a valid one then it goes to second step.
Figure 1:: Block Diagram of the Project Otherwise Buzzer will be on and it gives the error message
A. Analysis of hardware Structure display like invalid person again it displays to show your
RFID card.
1) ARM7TDMI: ARM architecture is based on Reduced Step2: In this step the user have to enter the correct password,
Instruction Set Computer (RISC) Principles. The RISC if the userr will entered the wrong password it will not moves
instruction set, and related decode mechanism are much the next step and the buzzer will be on, if the password
simpler than those of Complex Instruction Set Computer accessing is continuously failed for three times means then
(CISC) designs. This simplicity gives: process will move to the initial condition i.e. RFID tag
showing step. If the user will entered the correct password
• A high instruction throughput
then controller asks for a fingerprint access.
• An excellent real-time interrupt response
Step3: In this step the controller asks for a figure print access,
• A small, cost-effective,
effective, processor macro cell.
if the finger print accessing is failed then buzzer will be on
Microcontroller: A Micro controller consists of a powerful
and the process will move to the first step i.e. RFID tag
CPU tightly coupled with memory RAM, ROM or EPROM),
showing step. If fingerprint access is matched with stored
various I / O features such as Serial ports, Parallel Ports,
fingerprint or authorized person finger print
pr then it moves to
Timer/Counters, Interrupt Controller, Data Acquisition
next step (Iris recognition).
interfaces-Analog
Analog to Digital Converter (ADC), Digital to
Step4: In this step the person who ever want access that
Analog Converter (ADC), everything integrated onto a single
particular accessories or things first
firs he/she has to place his eye
Silicon Chip.
in front of the PC camera at that time it will capture the image
2) RFID reader Module: This is used to automatically identify of eye and comparing with previous eye image in that same
the products tagged within the communication range
r of the way we can access some others with matching or compare of
reader, which will be able to provide the accurate eye image and this whole process will done with wi the help of
consignments and real-time
time automatically manifest, and matlab code. If it matches the locker system will be opened,
improve movable asset management accuracy and efficiency. user will access that Particular accessories or things
thing and the
3) Finger Print Scanner: A fingerprint sensor is an electronic process goes on. If captured image does not matched with first
device used to capture a digital image of the fingerprint taken image then the controller gives a halt to the process
pr and

171
Global Journal of Advanced Engineering Technologies, Vol1,Issue3-2012
Vol1,Issue3 ISSN : 2277-6370

moves to the initial step1 at the same time buzzer will be on.
on
Figure2 shows the complete system operation flow
C. System operation flow

Figure 3: Practical implementation Figure

3. BIOMETRICS
Biometrics is a technology which uses physiological or
behavioural characteristics to identify or verify a person [1].
Typical characteristics used for authentication include
fingerprint, iris and face. A conventional biometric
authentication system consists of two phases: enrolment and
verification (Figure4).

Figure 2: The system operation flow

When kit is switched on, first it displays “WELCOME TO


THE PROJECT” in lcd. After some delay it displays “SHOW Figure 4:: Conventional biometric authentication
YOUR IDENTITY
DENTITY CARD” in lcd display. The users user have to During the enrolment phase, a biometric feature set is
show their RFID tag in front of the RFID reader. If the tag is extracted from user’s biometric data and a template is created
invalid Buzzer will be on at the same time it displays and stored. During the verification phase, the same feature
“INVALID
ALID PERSON” in lcd display. If the tag is valid one it extraction algorithm is applied to query biometric data, and
displays “VALID PERSON” in lcd display. After that it the resulting query
ry feature set is used to construct a query
displays “ENTER CODE FOR VERIFY” IFY” in lcd, through the template. The query template is matched against the stored
keys user have to enter the password. If the user entered the template(s) for authentication.
wrong password Buzzer will be onn and at the same time it Compared to password/smartcard-based
password/smartcard authentication
displays “WRONG PASSWORD“ “REENTER CODE approaches, biometrics-based
based solutions have many desired
VERIFY”. If we entered the correct password it displays features [5] such as being resistant to losses incurred by theft
“PASSWORD ENTERED CORRECT”. After some delay it of passwords and smartcards, as well as user-friendliness.
displays “CHECKING FOR FINGER PRINT” “PLACE Biometrics bears a user’s identity and it is hard to be forged.
YOUR FINGER IN FINGERPRINT MODULE”. MODULE After Unfortunately, brings its own complications:
showing this display user have to place his finger in finger
print module. If the fingerprint image is not valid buzzer will • Security concern: conventional biometric
b authentication
be on and displays “INVALID PERSON” but if it is valid system record biometric templates in a Central Authentication
image it displays “IMAGE IDENTIFIED” “VALID PERSON Entity’s (CA’s) database. The stored templates, which
IMAGE” After some delay itt displays “CHECKING FOR correlate to users’ biometric data, become potential targets to
IRIS IDENTITY”
TITY” after showing this step user have to place be attacked.
tacked. Some literature [1], [8] [8 has identified the
his eye in front of the camera. If the eye image is valid one vulnerabilities caused by the compromise of stored templates.
then the DC motor will be opened and closed. Figure 3 shows
the practical implementation on kit.

172
Global Journal of Advanced Engineering Technologies, Vol1,Issue3-2012 ISSN : 2277-6370

• Privacy concern: Biometrics identifies individuals. To the LPC, MFCC, etc. According to the biometrics selected and its
best of our knowledge, conventional biometric authentication application the feature extraction technique can be applied.
system is primarily built upon a fully-trusted model; that is,
the central authentication entity (CA) is trusted to take full iv) Recognition Module
control of users’ biometric information and is assumed to not The feature vectors, generated in the Feature Extraction
misuse the information. This assumption of trustworthiness Module are used in this module to classify the biometric data.
about the CA is not sufficient in the current malicious There are the classifiers like hamming distance, Euclidian
environments, since handing over one’s biometric information distance, and Support vector machine classifier. The rules are
to other parties or loss/compromise of one’s biometric defined for recognition of a person with his /her biometrics [5].
template will cause serious user privacy [5] concern. According to the biometric applications, the suitable
classifiers can be used to get better performance of the system.
• Irreplaceability: biometric data is permanently bound to a The feature vectors are used to write the decision making
user, and it is almost impossible to generate a new set of rules. In this module user’s identity is established or a claimed
biometric features for a legitimate user. Thus compromised identity is accepted or rejected.
biometrics is not replaceable.
Many approaches [5], [8] addressing the security and privacy B. FINGER PRINT
issues of biometrics have been proposed in the literature. Among all the biometric techniques, fingerprint-based
These approaches avoid storage of plain biometric templates identification [4] is the oldest method which has been
by recording them in a “distorted” way. successfully used in numerous applications. Figure5 shows
fingerprint images. The finger prints of a person have been
A. Biometric Recognition System used as person identification from long time. The finger prints
The Biometric Recognition Systems are used to identify of the identical twins are different. Everyone is known to have
the person based on the feature vectors of any one of the unique, immutable fingerprints. A fingerprint is made of a
biometric that the person possesses [8]. These systems are series of ridges and furrows on the surface of the finger. The
person authorized systems hence offer more secure and uniqueness of a fingerprint can be determined by the pattern
convenient process of identification compared to alternative of ridges and furrows as well as the minutiae points [3].
methods of identification. Each person has to establish the Minutiae points are local ridge characteristics that occur at
identity ranging from drivers’ license to gaining entry into a either a ridge bifurcation or a ridge ending. Fingerprint
country to the passport. The biometric system uses the matching techniques can be placed into two categories:
individual’s physical characteristics like fingerprint, hand minutiae based and correlation based. Minutiae-based
geometry, face, voice or iris. A simple biometric system techniques first find minutiae points and then map their
consists of four modules: Image acquisition, Pre-processing, relative placement on the finger.
Feature extraction and Recognition. Fingerprint matching based on minutiae has problems in
matching different sized (unregistered) minutiae patterns.
i) Image Acquisition Module Local ridge structures cannot be completely characterized by
This is the first module to acquire the biometric input. The minutiae. Efforts are being on to try an alternate
input can be image according to the selection of biometrics. representation of fingerprints, which will capture more local
The sensors like high resolution CCD camera or recorder can information and yield a fixed length code for the fingerprint.
be used to capture the biometric image. The distance between The matching [12] will then hopefully become a relatively
the sensor and human should be constant, the lighting system simple task of calculating the Euclidean distance will between
as well as physical capture system should be constant to the two codes.
acquire standard biometric input. Finger Print Classification:
Fingerprint classification [4] is a technique to assign a
ii) Pre-processing Module fingerprint into one of the several pre-specified types already
Once the input is captured, the original input image or established in the literature, which can provide an indexing
voice signal is processed to remove the noise and blurring mechanism. Fingerprint classification can be viewed as a
effect. The image is localized to extract the region of interest. coarse level matching of the fingerprints. An input fingerprint
The voice signal is framed to extract the desired signal. Then is first matched at a coarse level to one of the pre-specified
this processed input is given to feature extraction module. types and then, at a finer level, it is compared to the subset of
the database containing that type of fingerprints only.
iii) Feature Extraction Module
In the feature extraction module, the pre-processed image Different algorithms [13] are developed to classify
is used to extract the features. The feature extraction fingerprints into five classes, namely, whorl, right loop, left
algorithms are applied to get feature vector of the biometric loop, arch, and tented arch. The algorithm separates the
image. There are various feature extraction techniques like number of ridges present in four directions (0 degree,
Independent Component Analysis, Linear discriminate 45degree, 90 degree, and 135 degree) by filtering the central
component, principal component analysis, wavelet transform, part of a fingerprint with a bank of Gabor filters.

173
Global Journal of Advanced Engineering Technologies, Vol1,Issue3-2012
Vol1,Issue3 ISSN : 2277-6370

• Biometric templates once captured do not need to be


enrolled again, iris stable throughout a human life.
life

Figure 6:: Locating the overall region of iris


IMPLEMENTATION OF IRIS RECOGNITION:

Fig 5: Fingerprint images IMAGE ACQUISITION:


Image acquisition [10] is considered
consider the most critical step
This information is quantized to generate a Finger Code which since all subsequent stages depend highly on the image quality.
is used for classification. This classification is based on a two-
two In order to accomplish this, we used a CCD camera. We set
stage classifier which uses a K-nearest neighbour
eighbour classifier in the resolution to 640x480, the type of the image to jpeg, and
the first stage and a set of neural networks in the second stage. the mode to white and black for greater details. Furthermore,
we took the eye pictures while trying to maintain appropriate
appropria
C. IRIS settings such as lighting and distance to camera. The camera is
The iris is a biological feature of human. It is a unique situated normally between half a meter to one meter from the
structure of human which remains stable over a person subject. (3”to 10 inches)
lifetime. Iris recognition is a new field of Pattern recognition.
Iris recognition [7] is based on visible (via regular and/or
infrared light) qualities of the iris. A sample human eye image
is given in Fig6.. Other visible characteristics include rings,
furrows, freckles, and the corona [9],, to cite only the more
familiar. Expressed simply, iris recognition technology
converts these visible characteristics into a 512 byte Iris
Code(tm), a template [2] stored for future verification
attempts. 512 bytes is a fairly compact size for a biometric Figure8: Block Diagram of Image Acquisition System Using CCD Camera
template, but the quantity of information derived from the iris
is massive. The CCD-cameras job is to take the image from the optical
The density of information is such that each iris can be said to system and convert it into electronic data. Find the iris image
have 266 unique "spots", as opposed to 13-60 13 for traditional by a monochrome CCD (Charged couple Device) camera
biometric technologies. This '266' measurement is cited in all transfer the value of the different pixels out of the CCD chip.
iris recognition literature.; after allowing for the algorithm's Read out the voltages from the CCD-chip.
CCD Thereafter the
correlative functions and for characteristics inherent to most signals of each data are amplified and sent to an ADC (Analog
human eyes., It has been concluded that 173 "independent to Digital Converter).
binary degrees-of-freedom"
freedom" can be extracted from his
algorithm - an exceptionally
eptionally large number for a biometric The 4. CONCLUSION
iris image consists of the colored tissue surrounding the pupil. Secured Approach for Authentication System by using
The iris recognition systems are known as real time, high Fingerprint and Iris proves to be very effective in providing
confidence recognition of person identification [2]. [2 These security.
systems are used in many applications [6] like passports, A step by step approach in designing the Secured
activation security, and controlling access to restricted areas at Approach for Authentication System by using Fingerprint and
airports, database access and computer login, access to Iris giving security to the users banking system and providing
building and homes, border crossings and other government the security for the locker system using a finger print scanner
program. and Iris has been followed.
llowed. The result obtained in providing
the security is quite reliable in all the three modes.
The iris recognition systems behave following
ollowing features: The system has successfully overcome some of the
• Perform 1: n identification with no limitation on numbers. aspects existing with the present technologies, by the use of
• The most robust biometric technology available in the finger print Biometric and iris Biometric as the authentication
market today never had a false acceptance. Technology.

174
Global Journal of Advanced Engineering Technologies, Vol1,Issue3-2012 ISSN : 2277-6370

Future Applications: Cybernetics and Informatics: WMSCI 2008 at Orlando,


• ATM machine use: Most of the leading banks have been Florida, USA during June 29th - July 2nd , 2008.
experimenting with biometrics for ATM machine use and as a [7] John Daugman, Cathryn Downing, “Effect of Severe
general means of combating card fraud. Image Compression on Iris Recognition Performance”,
• Workstation and network access: Many are viewing this as IEEE Transactions on information Forensics and
the application, which will provide critical mass for the Security, Vol. 3, No. 1, March 2008.
biometric industry and create the transition between sci-fi [8] Joseph Lewis, University of Maryland, Bowie State
device to regular systems component, thus raising public University,” Biometrics for secure Identity Verification:
awareness and lowering resistance to the use of biometrics in Trends and Developers” January 2002.
general.
•Travel and tourism: There are multi application cards for
[9] Lia Ma, Yunhong Wang, Tieniu Tan, “Iris Recognition
travelers which, incorporating a biometric, would enable them Based on Multichannel GaborFiltering”, ACCV2002: The
to participate in various frequent flyer and border control 5th Asian Conference on Computer Vision,23-25
systems as well as paying for their air ticket, hotel room, hire January 2002, Melbounce, Australia.
care etc. [10] Daugman J: How iris recognition works. The Computer
• Telephone transactions: Many telesales and call center Laboratory, University of Cambridge. [Acessed 2003 Jan
managers have pondered the use of biometrics. 23 at http://www.CL.cam.ac.uk/users/jgd1000 webcite]
Benefits: [11]http://fingerprint.nist.gov/latent/elft07/phase1_aggregat.p
 No more forgotten passwords, lost cards or stolen pins. df.
You are your own password. [12] J. Feng. Combining minutiae descriptors for fingerprint
 Positive Identification-It identifies you and not what matching. Pattern Recognition, 41(1):342–352, 2008.
you have or what you carry. [13] Evaluation of latent fingerprint technologies 2007.
 Highest level of security. http://fingerprint.nist.gov/latent/elft07/.
 Offers mobility.
 Impossible to forget.
[14] Conclusion of circuit court judge Susan Souder - grants
motion to exclude testimony of forensic fingerprint
ACKNOWLEDGMENTS examiner capital murder case: State of Maryland v.
We would like to thank Mrs.P.J.Saritha , who had been Bryan Rose, October 2007.
guiding through out to complete the work successfully, and http://www.clpex.com/Information/STATEOFMARYLAN
would also like to thank the HOD Mr.T.Sravan Kumar, ECE D-v-BryanRose.doc.
Department and other Professors for extending their help &
support in giving technical ideas about the paper and AUTHORS
motivating to complete the work effectively & successfully. Mr. D. Shekar Goud pursuing his M. Tech in
Embedded Systems from Ellenki College of
REFERENCES Engineering and Technology, Medak.
[1] Kresimir Delac, Mislav Gregic, “A Survey of Biometric Completed his B. Tech (ECE) from Royal
Recognition Methods”, 46thInternational Symposium College of Engineering, Medak. His
Electronic in Marine, ELMAR-2004, 16-18June Interested areas of Research include
2004,Zadar, Croatia. Embedded Systems, and Digital Electronics.
[2] Li Ma , Tieniu Tan , Yunhong Wang , Dexin Zhang ,
“Personal Identification Based on Iris Texture analysis” , Mr. Ishaq Md pursuing his M. Tech in
IEEE Transactions on pattern Analysis and Machine Embedded Systems from Ellenki College of
Intelligence , Vol. 25 No. 12, December 2003. Engineering and Technology, Medak.
[3] A.K. Jain, L. Hong, R. Bolle, “On-line Fingerprint Completed his B. Tech (ECE) from Aizza
verification” , IEEE Trans. Pattern Anal. Mach. Intel. College of Engineering and Technology,
1997. Mancherial. His Interested areas of Research
[4] K. Karu, A.K. Jain, “Fingerprint classification, Pattern include Embedded Systems, VLSI, Digital
Recognition”, 1996. Systems, and Digital Electronics.
[5] Anil K. Jain, Arun Ross, Sharath Pankanti “Biometrics:
Mrs. PJ Saritha working as Associate
A Tool for Information Security”, IEEE Transactions on
Professor in Department of ECE, Ellenki
Information Forensics and Security, Vol 1,No. 2, June
College of Engineering and Technology,
2006.
Medak. Completed her M.E from Osmania
[6] Sulochana Sonkamble, Dr. R.C. Thool, Balwant University, Hyderabad. Areas of research
Sonkamble,“An Effective Machine-Vision System for interest include Embedded systems and
Information Security and Privacy using Iris Biometrics”, Antennas.
in The 12th World Multi-Conference on Systemics,

175

Das könnte Ihnen auch gefallen