Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: fingerprint
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
fingerprint
[attachment=19908]
Why we need biometrics?
In order to avoid the problems of forgetting passwords and ID codes, Biometrics based authentication helps us in verifying your finger prints, iris pattern and voice for your identity at A.T.M’s, Airports etc.., you can unlock your houses, withdrawing money from a bank with just a blink of an eye, a tap of your finger or by just showing your face.

APPLICATIONS AREAS:
The uses for biometric security are varied and growing. It was developed in response to a need to associate human action with identity – whether conducting a transaction, accessing a computer or a critical information system, or entering secure physical area. Some of the existing and proposed applications in general we use are described below:

Computer/Network security:
Many stand-alone and network computer systems carry valuable and sensitive information. Controlling access to these systems is another major use of biometric authentication systems.
Internet transactions:
Due to growing security requirements that results from the boom in e-commerce, many think of on-line transactions as being an obvious area for biometrics. The biometric authentication generates a greater degree of vendor confidence because he knows that person that the person at the terminal is he who he claims to be.

Physical area security:
Military, Government, and Commercial installations have sufficiently strong confidentiality concerns. The biometric identifiers play a major role in controlling physical access to these installations.

Banking:
Many leading banks have been experimenting with biometrics for ATM use as a means of combating card fraud. Beginning 2002, some companies will being issuing smart credits cards, with customer’s fingerprint information embedded.

Voting:
A logical use of biometrics is in voting process where eligible politicians are required to verify their identity. This is intended to stop “proxy” voting.

Prisons:
An interesting use of biometrics is in prisons where the visitors to a prisoner are subjected to verification procedures in order that identities may not be swapped during the visit.

Fingerprint recognition:
Finger prints are unique to each individual and no two fingerprints are alike. Fingerprint recognition is most widely accepted biometric among the technology being used today. Fingerprints contain patterns of ridges and valleys as well as minutiae points. Minutiae points are local ridge characteristics that occur at either the ridge bifurcation or a ridge ending.
Skin on human fingertips contains ridges and valleys which together forms distinctive
patterns. These patterns are fully developed under pregnancy and are permanent throughout
whole lifetime. Prints of those patterns are called fingerprints. Injuries like cuts, burns and
bruises can temporarily damage quality of fingerprints but when fully healed, patterns will be
restored.

Through various studies it has been observed that no two persons have the same
fingerprints, hence they are unique for every individual .

Currently, there are two accepted methods for extracting the fingerprint data
(I) Minutia-based and
(II) Correlation-based
1) Minutia-based
“Minutia-based is the more microscopic of the two. This method locates the ridge characteristics (branches and endings) and assigns them a XY-coordinate that is then stored in a file.
2) Correlation-based
The correlation-based method looks at the entire pattern of ridges and valleys in the fingerprint. The location of the whorls, loops and arches and the direction that they flow in are extracted and stored. Neither method actually keeps the captured image; only the data is kept, therefore making it impossible to recreate the fingerprints.”
its nothing but creap.. it tells nothing how can we store fingerprints in the module... Angry