Professional Documents
Culture Documents
Acknowledgement
1|P a ge
Acknowledgement
We owe a deep sense of gratitude to my project guide Mr. A. K. Mishra for stimulating my interest in the subject. His involvement right from conceptualization of the study through its execution and meticulous perusal of the manuscript ensured its timely completion. I would also like to thank my internal guide and Head Of Department Prof. S. M. Atkore for his thought provoking comments, valuable suggestions constant motivation encouragement and support. I would also like to thank all our teachers for contributing to my overall training. Heartfelt thanks to our family for their unconditional support and last but not the least our friends and colleagues for their help and cooperation.
2|P a ge
ABSTRACT
3|P a ge
ABSTRACT
LETS MAKE THINGS BETTER Is what the billboards and commercials of a leading electronic goods Company al over the world say . The statement may not seem a lot when seen at first glance, but then seen in the content of the product it means a lot. Although it can be said that the change should be for the good and also be warranted . Some skeptics may argue that why do we need to make things better when present things work properly? But this view may be said a shortsighted approach to the development of any product it is evident from the present markets that change is the name of the game, and so to stay in the competitive market it is necessary to keep on improving to stay ahead of the competing group. Fingerprint Recognition System The name it self suggest that the project is based on access of the system with help of the biometrics i.e. physical parameters of human being. The three main components of this project are as follows: 1. Fingerprint Sensor 2. Microcontroller 3. Computer The scanner used is manufactured by MIAXIS company the model is SM-630 and the model no. 83100848. The scanner can store about 768 finger templates. The scanner is programmed with the help of the microcontroller. The computer is used to store the database of the person on the basic of his fingerprint software made by us in Visual Basic 6.0.
4|P a ge
CONTENTS
THE JOURNEY OF THOUNDS MILES BEGINS WITH ONE SINGLE STEP - UNKNOWN
5|P a ge
Contents:
Introduction Objective and scope Organization of the report Chapter 1 1.1 Literature Survey 5. Chapter 2 2.1 Introduction 2.2 What is Fingerprint Recognition? 2.3 How does Finger Recognition work? 6. Chapter 3 3.1 Basic Block Diagram 3.2 Circuit diagram 3.3 Algorithm 3.4 Main Components of Project 7. Chapter 4 4.1 Keil 4.2 Visual Basic 6.0 4.3 Software Developed 8. Chapter 5 5.1 Testing of Software 9. Future Prospectus and Conclusion 10. Appendix 1. 2. 3. 4.
page no.
8 10 11 12 13 20 21 23 24 29 30 31 33 35 43 44 46 53 58 59 61 62
6|P a ge
List of Figures:
Figure 1: Figure 2: Figure 3: Figure 4: Figure 5: Figure 6: Figure 7: Figure 8: Figure12: Minutiae of a Typical Fingerprint Block diagram Circuit Diagram Flow Chart Front view Side view Top view Form related to module Form granting staff leave to the employee 20 28 31 34 40 40 41 47 57 58
Figure 10: Form for the verification of the finger Figure 11: Form showing details of the employee after the fingerprint validation Figure9: Form for the com port setting
59 60 61 62
Figure13: Data flow diagram Figure 14: Crystal report to view the entry of the employee
7|P a ge
INTRODUCTION
Even if smog were a risk to human life we must remember that life in nature without technology is wholesale death. -Ayn Rand
8|P a ge
INTRODUCTION
Accurate automatic personal identification is critical in a variety of applications in our electronically interconnected society. Biometrics, which refers to identification based on physical or behavioral characteristics, is being increasingly adopted to provide positive identification with a high degree of confidence. Among all the biometric techniques, fingerprint-based
authentication systems have received the most attention because of the long history of fingerprints and their extensive use in forensics. Fingerprint and other biometric devices consist of a reader or scanning device, software that converts the scanned information in to a digital form ,and whenever the data is to be analyzed, a database that stores the biometric data for the comparison with previous records. When converting the biometric input the software identifies specific points of data as match points. The match points are processed using an algorithm compared with biometric data scanned when a user tries to gain access.
This project is very useful to the company and office in order to maintain the employee details. Details of the employee are maintained in the data base in PC. So we can easily cross verify the details. The employee details are stored by providing an ID no. to their finger impression.
9|P a ge
10 | P a g e
Chapter 2
Gives theory related to the fingerprints. What are different issues related to the fingerprints, like what are the fingerprints , why are the fingerprint important and the structure of the fingerprint and feature of the fingerprint. Also explain how fingerprint is efficient than other types.
Chapter 3
Explains the block diagram, circuit diagram of the project . The working of each module is explained.
Chapter 4
Explain the working of the software
Chapter 5
Explain the testing and performance analysis i.e. the testing of different modules. It also gives the feature development.
11 | P a g e
CHAPTER 1
12 | P a g e
LITERATURE SURVEY
What Are Biometrics?
Biometrics is automated methods of recognizing a person based on a physiological or behavioral characteristic. They include fingerprints, retinal and iris scanning, hand and finger geometry, voice patterns, facial recognition, and other techniques. The biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. Biometrics is expected to be incorporated in solutions to provide for Homeland Security including applications for improving airport security, strengthening our national borders, in travel documents, visas and in preventing ID theft. Now, more than ever, there is a wide range of interest in biometrics across federal, state, and local governments. Congressional offices and a large number of organizations involved in many markets are addressing the important role that biometrics will play in identifying and verifying the identity of individuals and protecting national assets. There are many needs for biometrics beyond Homeland Security...
y y y y y
Enterprise-wide network security infrastructures, Secure electronic banking, investing and other financial transactions, Retail sales, Law enforcement, and Health and social services
13 | P a g e
inexpensively and securely. The IWS Biometric Engine can be integrated into a variety of applications that can be deployed in a wide array of industries, such as:
y y y y y y y y
Driver License Systems National ID Systems Airport Security Border Control Systems Voter Identity Verification Access Control and Facilities Management Law Enforcement Systems Amusement & Events
The IWS Biometric Engine is based on field-proven IWS technology that has been used to manage millions of biometric templates and algorithms for virtually all leading biometric types including:
y y y
FaceNIST-compliant mug shots Iriscivil Hand Geometry PalmNIST Signature Voice 3D Face
Convenience vs. Security: How Well Do Biometrics Work:Can you be absolutely certain that a biometric device will work as claimed? Will it securely keep the bad guys out, while effortlessly letting the good guys in? In real life, security versus convenience turns out to be pretty much a non-issue, since the combination of biometric identification plus a keypad code provides virtually unbreakable security. Here's why. Biometric devices can be adjusted to favor security or user convenience. Think of a car alarm. When your car alarm is very sensitive, the probability of the bad guys stealing it is low. Yet the chance of your accidentally setting off the alarm is high. Reduce the sensitivity, and the number of false alarms goes down, but the chance of someone stealing your car increases. The security requirements of a national defense contractor might demand that the device at the front door be adjusted to keep the bad guys out, for example. On the other hand, if hundreds of employees will clock in using a biometric reader at a low-security facility, you'll want to adjust the unit's sensitivity to let the good guys in.
16 | P a g e
CHAPTER 2
BASIC OF FINGERPRINT
20 | P a g e
21 | P a g e
Figure 1: Minutiae of a Typical Fingerprint The set of these minutiae characteristics can provide a template for a fingerprint. Provided that these characteristics are measured sufficiently accurately,
22 | P a g e
23 | P a g e
The first step is to setup your fingerprint recognition devices and scan all fingerprints that will have access. You will only need to do this once as the fingerprint recognition device stores the fingerprints as templates in a mathematical algorithm form. Depending on your setup, the device may store this in a database or use smart card technology for local storage of these fingerprint
templates.
y
When an individual is wanting access, the individual must put their finger on the fingerprint recognition device or depending on the system, you may only need to put it close to the fingerprint scanning area. The fingerprint recognition device then captures the individuals fingerprint and puts in into a template form using a mathematical algorithm and compares it to its database or storage of fingerprints to determine if it matches any existing fingerprints. If the fingerprint device finds a match then access is granted.
Simple Truths - Users don't trust what they don't understand. Most IT security
concepts are incomprehensible to the common user. Explaining public and private
25 | P a g e
Cost - Just as in the early days of desktop computers when a system cost more
than 100,000 Rs only a few people had systems. Now when they cost less than 20000 Rs, everybody has one. This same "order of magnitude" cost breakthrough has recently occurred with fingerprint technology. What cost 40,000 two years ago is now available for less than 20,000. Cost alone is not the answer, but it is a necessary component of broad market acceptance of this technology.
27 | P a g e
28 | P a g e
CHAPTER 3
29 | P a g e
Rs232
PC
Power supply
30 | P a g e
CAPACITORS: C1, C2 = 100n C3, C4, C5, C6, C7 = 10F C8, C9 = 33p
TRANSISTOR: Q1 = BC547
32 | P a g e
4.3 Algorithm:
1. Start 2. Place the finger on the fingerprint sensor 3. Check the impression 4. Operations to be performed .i.e. add, delete, search, read. 5. If add add the data to database. 6. If delete remove the data from the database. 7. If search, then display the result. 8. stop
33 | P a g e
The AT89S52 provides the following standard features: y 8K bytes of Flash, y 256 bytes of RAM, y 32 I/O lines, y Watchdog timer, y two data pointers, y three 16-bit timer/counters, y a six-vector two-level interrupt architecture, y a full duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes.
35 | P a g e
POWER SUPPLY:
The performance of the master box depends on the proper functioning of the power supply unit. The power supply converts not only A.C into D.C, but also provides output voltage of 5V, 1 amp. The essential components of the power supply are Transformer, four diodes which forms bridge rectifier, capacitor which work as a filter and positive voltage regulator IC 7805
RS232-SETUP:
Interfacing the hard ware with the PC has the following advantages: y Storing and retrieval of data becomes easier. y Networking can be done and hence the entire system can be monitored online. y Access can be user friendly. Interfacing the hard ware with the PC is done using MAX232 (rs232) The MAX220MAX249 family of line drivers/receivers is intended for all EIA/TIA-232E and V.28/V.24 communications interfaces, particularly applications where 12V is not available. These parts are especially useful in battery-powered systems, since their low-power shutdown mode reduces power dissipation to less than 5 W. The MAX225, MAX233, MAX235, and MAX245/MAX246/MAX247 use no external components and are recommended for applications where printed circuit board space is critical.
36 | P a g e
37 | P a g e
38 | P a g e
Technical Specifications
Operating Voltage Operating Current Fingerprint Template Search Time Power-on Time
4.3V6V 80mA Input voltage 5V 768 templates 1.5s (200 fingerprint, average value in test) 200msTime lapse between module poweron to module ready to receive instructions 45 64KByte Standard serial interface TTL level 57600bps temperature: -10C+40C
Tolerated Angle Offset User Flash Memory Interface Protocol Communication Baud Rate Operating Environment
39 | P a g e
Fingerprint Recognition System Specification & Interface of the fingerprint sensor Dimension
Electrical Interface
Module is connected to HOST via 4PIN cable. The PIN definition is as follows: No. PIN Definition Remarks 1 Power supply Power supply +
2 Module Tx Open-drain output, need to use pull-up resistance in application (Typical value: 10K ) 3 Module Rx Wide voltage input, 7V affordable 4 Power supply Power supply
PERSONAL COMPUTERS:
41 | P a g e
A small, relatively inexpensive computer designed for an individual user. In price, personal computers range anywhere from a few hundred dollars to thousands of dollars. All are based on the microprocessor technology that enables manufacturers to put an entire CPU on one chip. At home, the most popular use for personal computers is for playing games. Personal computers first appeared in the late 1970s. One of the first and most popular personal computers was the Apple II, introduced in 1977 by Apple computer. During the late 1970s and early 1980s, new models and competing operating system seemed to appear daily. Then, in 1981, IBM entered the fray with its first personal computer, known as the IBM PC. The IBM PC quickly became the personal computer of choice, and most other personal computer manufacturers fell by the wayside. One of the few companies to survive IBM's onslaught was Apple Computer, which remains a major player in the personal computer marketplace.
42 | P a g e
CHAPTER 4
SOFTWARE SPECIFICATIONS:
4.1 KEIL
43 | P a g e
44 | P a g e
45 | P a g e
46 | P a g e
Figure 8: form related to module Each form module contains event procedures sections of code where you place the instructions that will execute in response to specific events. Forms can contain controls. For each control on a form, there is a corresponding set of event procedures in the form module. In addition to event procedures, form modules can contain general procedures that are executed in response to a call from any event procedure.
47 | P a g e
The main Moto of the software is to save the database of the employee on the basics of their fingerprint that may represent a unique method for the identification of the employee. Thus for this we have used the computer to present the software front end and fingerprint module to save the finger impression of the person. Images of the Fingerprint Recognition System are as follows:
Figure 11: form showing details of the employee after the fingerprint validation
55 | P a g e
56 | P a g e
Chapter 5
58 | P a g e
PASS
Staff-Biodata Enter the id on id on the sensor id accepted the staff biodata Load Picture keep empty the form should not be saved large size image image should fit the picture box select com port Invalid Port other then number present in system
PASS
Complete the form properly image spreads out of picture box Invalid Port number
PASS
3.2
Load Picture
FAIL
4 4.1
PASS
5 5.1
enter the number It should not more than accept the required number
FAIL
59 | P a g e
Select
program is terminated
PASS
As you see there are some test cases which have the status as FAIL we have also overcome those test cases after the testing you may view the changes when you will run the software. For example: One can not enter the telephone number greater than 11 digits. as the max length is set to 11.
60 | P a g e
Future Prospectus:
The future work of this will be at the airport where in the data will be stored in the PC so that the fraud which takes place will become less. The matching process can be made more efficient by increasing the number of sectors in the region of interest.
Conclusion
Fingerprint recognition system will provide high level of assurance that the individual that is accessing a particular area is who they say they are. This means that the password hacking , password key maintenance and additional needs for guards to secure a physical or logical area will be minimized or eliminated . Biometric devices set up an audit trial that could be placed directly into any standard computer application(i.e. application like Microsoft word or excel, operating system like windows - xp, etc.) Thus we conclude that It is an easy way to secure the database and maintain the security level on the basis of the fingerprint.
61 | P a g e
Appendix
Components used Quantity Cost ( .Rs)
Microcontroller Board
A. Semiconductor 1. AT89S52 microcontroller 2. MAX232 3. AT24C02 4. SM-630 [Fingerprint module] 5. BC547 (transistor) 6. LED 7. 1n4007 (diode) B. Passive components 1. 10F capacitor 63V 2. 100nF Ceramic capacitor 3. 33pF 4. Resistors (i). 470 (ii). 10 k 1/4w 1/4w 1 2 1 0.50 0.50 3 5 2 2 3 1 0.50 1 1 1 1 1 2 1 55 22 8 4000 2 3 1
(iii). 10 k register array SIL9 5. Switches Push to on 6. Crystal 11.0592 MHz 7. IC base 40 pin 8 pin
1 1
5 2
62 | P a g e
16 pin 8. DB9RS232 male connector 9. Serial port connector (F to F) 10. Connecting wires 11. PCB 12. Buzzer 3- 27 v 13. Connectors
1 1 2
3 25 75 10 100
25 40
Power Supply
Components used A. Semiconductors 1. LM7805 2. 1n4007 (diode) 3. LED B. Passive components 1. 470 1/4w 1 1 1 2 1 1 0.50 10 5 1 65 100
63 | P a g e
Quantity
Cost( .Rs)
1 4 1
8 1 1.50
2. 1000 F capacitor 25v 3. 100 F capacitor 25v 4. 100nF capacitor 50v 5. Transformer X mar 0-12v 6. PCB
The total cost of project components reaches up to 4649 Rs But keeping in mind the sincerity and the hard work of the members as well as the development of the software, we predict the cost of our total project up to 9000 Rs.
64 | P a g e