Design And Implementation Of Fingerprint Recognition System

The design and implementation of a fingerprint recognition system involves developing algorithms and software that can accurately analyze and match fingerprint patterns for authentication purposes. This involves creating a database of fingerprint templates, preprocessing raw fingerprint images to enhance clarity and remove noise, extracting distinctive features from the fingerprints, and employing matching algorithms such as minutiae-based matching or pattern-based matching to compare fingerprints for identification or verification. The system should also incorporate security measures to protect the fingerprint data and ensure reliable and efficient performance, making it suitable for applications in access control, authentication, and forensic analysis.

DEDICATION

This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my — for his financial support and moral care towards me.Also to my mentor — for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.

ACKNOWLEDGEMENT

The successful completion of this project work could not have been a reality without the encouragement of my — and other people. My immensely appreciation goes to my humble and able supervisor Mr. — for his kindness in supervising this project. My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. —, and Dr. —. I also recognize the support of some of the staff of — among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. — and the —. Finally, my appreciation goes to my elder sister —, my lovely friends mercy —, —, — and many others who were quite helpful.

 

 

 

CHAPTER ONE

  • INTRODUCTION

Biometrics  are  automated  methods  of  recognizing  a  person  based  on  a  physiological  or  behavioral characteristic. Biometric-based solutions are able to provide for confidential financial transactions and personal
data privacy. The various features used are face, fingerprints, hand geometry, handwriting, iris, retina, vein and  voice (Sahidullah et al., 2015).  Fingerprinting  or  finger-scanning  technologies  are  the  oldest  of  the  biometric  sciences  and  utilize
distinctive features of the fingerprint to identify or verify the identity of individuals. Finger-scan technology is the most commonly deployed biometric technology, used in a broad range of physical access and logical access applications. All fingerprints have unique characteristics and patterns. A normal fingerprint pattern is made up of lines and spaces. These lines are called ridges while the spaces between the ridges are called valleys.

It is through  the  pattern  of  these  ridges  and  valleys  that  a  unique  fingerprint  is  matched  for  verification  and authorization. These unique fingerprint traits are termed “minutiae” and comparisons are made based on these
traits (Jain et al., 2010). On average, a typical live scan produces 40 “minutiae”. The Federal Bureau of Investigation (FBI) has reported that no more than 8 common minutiae can be shared by two individuals.

There  are  five  stages  involved  in  finger-scan  verification  and  identification.  Fingerprint  (FP)  image acquisition,  image  processing,  and  location  of distinctive  characteristics,  template  creation  and  template matching  (Jain et al, 2018).  A  scanner  takes  a  mathematical  snapshot  of  a  user’s  unique  biological  traits.  This  snapshot  is saved  in  a  fingerprint  database  as  a  minutiae  file.  The first challenge  facing  a  finger-scanning  system  is  to acquire high-quality image of a fingerprint. The standard for forensic-quality finger printing is images of 500 dots per inch (DPI). Image acquisition can be a major challenge for finger-scan developers, since the quality of print differs from person to person and from finger to finger. Some populations are more likely than others to have  faint  or  difficult-to-acquire  fingerprints,  whether  due  to  wear  or  tear  or  physiological  traits.  Taking an image in the cold weather also can have an effect. Oils in the finger help produce a better print. In cold weather, these oils naturally dry up. Pressing harder on the platen (the surface on which the finger is placed, also known as a scanner) can help in this case. Image processing is the process of converting the finger image into a usable format. This results in a series of thick black ridges (the raised part of the fingerprint) contrasted to white valleys. At this stage, image features are detected and enhanced for verification against the stored minutia file. Image enhancement is used to reduce any distortion of the fingerprint caused by dirt, cuts, scars, sweat and dry skin (Jain et al, 2018). The next stage in the fingerprint process is to locate distinctive characteristics.  There is a good deal of information on the average fingerprint and this information tends to remain stable throughout one’s life. Fingerprint ridges and valleys form distinctive patterns, such as swirls, loops, and  arches.  Most fingerprints have a  core,  a  central  point  around which swirls, loops, or arches are curved. These ridges and valleys are characterized by irregularities known as minutiae, the distinctive feature upon  which  finger-scanning  technologies  are  based.  Many types of minutiae exits, a common one being ridge endings and bifurcation, which is the point at which one ridge divides into two.

A typical  finger-scan  may  produce  between  15  and  20  minutes.  A  template  is  then  created.  This  is accomplished  by  mapping  minutiae  and  filtering  out  distortions  and  false  minutiae.  For example, anomalies
caused by scars, sweat, or dirt can appear as minutiae. False minutiae must be filtered out before a template is created and is supported differently with vendor specific proprietary algorithms. The tricky part is comparing an
enrollment template to a verification template. Positions of a minutia point may change by a few pixels, some minutiae will differ from the enrollment  template, and  false  minutiae  may be seen as real. Many finger-scan
systems  use  a  smaller  portion  of  the  scanned  image  for  matching  purposes. One benefit of  reducing  the comparison area is that there is less chance of false minutiae information, which would confuse the matching
process and create errors.

1.2                                                  PROBLEM STATEMENT

The traditional system is still mostly used in lecture room or laboratory session in most institution today. Lecturer or instructor will give out a sheet of paper containing list of student’s name to sign or in some cases, the student will be the ones to write their names, student id and matriculation number to indicate their presence for a particular class. Falsification in student attendance does occur rampantly in the traditional method. For example, another student can easily sign an attendance on behalf of another student. In other to prevent this problem, it is necessary to develop an Authentication System for Students using fingerprint Biometric recognition that will be employed to track and keep the attendance of every student in a particular class. Fingerprint is unique feature for everyone compare to using barcode in smart cards. Therefore, this system designed in this project work is not based on the existing barcode system. Tracking and monitoring student time of attendance could be tedious, time consuming and more susceptible to errors. The security of the existing attendance system that are now use in classroom (signature system) can be easily compromised. Some students can master other student’s signature. Thereby, helping their colleague who are absent for a particular class to sign the attendance sheet using the duplicated signature. The Fingerprint recognition system designed in this research work for student is a more secure platform where students mark their attendance with their fingerprint.

1.3                                                   AIM AND OBJECTIVES

The aim of this project work is to simulate an embedded fingerprint recognition system, which is used for access security applications. The specific objectives include:

  1. To provide a platform that will allow access using finger print.
  2. To provide a platform that will allow users to store data in a centralized database.

III.            To design a new system that will increase security

1.4                                                   SCOPE OF THE STUDY

The scope of this work covers implementing a security system using the finger print. There is a centralized database to take care of student personal and biometric data. The system is designed to query the database by inputting a user finger print and if it matches with the one in a system it will generate a 4-digit number that will enable the user to continue with his transactions.

1.5                                         SIGNIFICANCE OF THE PROJECT

Fingerprint recognition system when used in student attendance management system will eliminate the use of paper in manual signing processes and all the risk associated with it. One of the risks of using a paper in class attendance is that it can be easily misplaced and students cheat by signing for each other not present in the class thereby defeating the aim of taking the attendance. Tracking and monitoring students time of attendance could be tedious, time consuming and susceptible to error. Thus, the System will drastically reduce time needed to verify attendance data.

The System also allows the institution management to track or investigate student class attendance in a particular course having poor attendance thereby enabling the management to rectify the situation by providing the necessary interventions. The system provide high level of security whereby making it impossible for imposters and impersonators in making their ways to examination halls. The System using fingerprint Biometric will keep historical data making it easy for lecturers to access and grade students.

Fingerprint recognition system is extremely useful in institutions especially during classes, tutorials,  laboratory sessions and examination during which heavy security are normally deploy to validate student’s identity in order to cob imposters, with the use of  authentication System the number of security personnel will be greatly reduce. Most lecturers’ handout sheet of paper for their class attendance, which can easily be misplaced or damaged and poses a lot of stress in accumulating grades for their students. The system allows the lecturer to monitor each student attendance, track down truants and take the appropriate action. Thus, the system eliminates all these downsides. The Authentication system is not only useful to the institutions and lecturers alone, even the students benefit a great deal by reducing the stress in queuing up which result in delay and often time in the damage of the attendance sheet. It also prevents mistakes and anomaly that is associated with manual signing in which student that attend a class are marked as not present thereby losing the mark accorded to the particular attendance due to multiple attendance sheet.

  • Students will be more regular in attending their classes since now no password or no attendance sheet signature is required, so no friend or any other student can make an attendance on behalf of others as fingerprints are unique for every student.
  • Teachers do not need to waste their time approximately 15min of 1hour for taking attendance of students.
  • No need to maintain attendance sheet as the attendance are electronically stored in database.
  • The system helps the faculty to easily find out defaulters.
  • User may easily get attendance history of a particular student.
  • It saves time, cost, efforts and institute resources.

1.6                                          LIMITATIONS OF THE STUDY

The efficiency of the scanner can be reduced due to the roughages in the captured images which are often caused by worn-out or cut or dirt’s found on fingerprint. Therefore, there is every possibility that enrolled users can be rejected by the system. Also the scanner or sensor cannot distinguish between a real and an artificial finger, therefore it is possible to fool the scanner. In addition, if an enrolled fingerprint is been duplicated or spoof, it is not possible to change fingerprint as in the case of password because user finger biometric.

1.7                                                  DEFINITION OF TERMS

Fingerprint: A fingerprint is an impression left by the friction ridges of a human finger. Fingerprint records normally contain impressions from the pad on the last joint of fingers and thumbs. Human fingerprints are detailed, nearly unique, difficult to alter, and durable over the life of an individual, making them suitable as long-term markers of human identity.

Detection system: detection system is a device or software application that monitors a systems for malicious activity or policy violations.

Biometric System: biometric system is a system that allows the recognition of a certain characteristic of an individual using mathematical algorithms and biometric data.

 


PROJECT DESCRIPTION

Format = Microsoft word

Chapters = 1-5 chapters

Price: N3,000.


For more information contact us through any of the following means:

Mobile No: +2348146561114 or +2347015391124

Email address: [email protected]

Whatsapp No: +2348146561114

Save/Share This On Social Media:
More About Design And Implementation Of Fingerprint Recognition System Material

Author: See the writer of ‘Design And Implementation Of Fingerprint Recognition System’ name on the first page of the downloaded file.

Acknowledgement: You must acknowledge and reference the writer of Design And Implementation Of Fingerprint Recognition System on your acknowledgement and reference pages respectively.

Upload Similar: You can upload any content similar to Design And Implementation Of Fingerprint Recognition System and get paid when someone downloaded the material.

Download: Click on “Donate & Download” under this Design And Implementation Of Fingerprint Recognition System Title and you will be redirected to download page after the donation or chat with Us for alternative methods.

Content Size: Design And Implementation Of Fingerprint Recognition System contains , and .