You are on page 1of 64

Fingerprint Recognition System

Acknowledgement

1|P a ge

Fingerprint Recognition System

Acknowledgement

We owe a deep sense of gratitude to my project guide Mr. A. K. Mishra for stimulating my interest in the subject. His involvement right from conceptualization of the study through its execution and meticulous perusal of the manuscript ensured its timely completion. I would also like to thank my internal guide and Head Of Department Prof. S. M. Atkore for his thought provoking comments, valuable suggestions constant motivation encouragement and support. I would also like to thank all our teachers for contributing to my overall training. Heartfelt thanks to our family for their unconditional support and last but not the least our friends and colleagues for their help and cooperation.

2|P a ge

Fingerprint Recognition System

ABSTRACT

A LITTLE PROGRESS EVERY DAY LEADS TO BIG RESULTS - UNKNOWN

3|P a ge

Fingerprint Recognition System

ABSTRACT
LETS MAKE THINGS BETTER Is what the billboards and commercials of a leading electronic goods Company al over the world say . The statement may not seem a lot when seen at first glance, but then seen in the content of the product it means a lot. Although it can be said that the change should be for the good and also be warranted . Some skeptics may argue that why do we need to make things better when present things work properly? But this view may be said a shortsighted approach to the development of any product it is evident from the present markets that change is the name of the game, and so to stay in the competitive market it is necessary to keep on improving to stay ahead of the competing group. Fingerprint Recognition System The name it self suggest that the project is based on access of the system with help of the biometrics i.e. physical parameters of human being. The three main components of this project are as follows: 1. Fingerprint Sensor 2. Microcontroller 3. Computer The scanner used is manufactured by MIAXIS company the model is SM-630 and the model no. 83100848. The scanner can store about 768 finger templates. The scanner is programmed with the help of the microcontroller. The computer is used to store the database of the person on the basic of his fingerprint software made by us in Visual Basic 6.0.

4|P a ge

Fingerprint Recognition System

CONTENTS

THE JOURNEY OF THOUNDS MILES BEGINS WITH ONE SINGLE STEP - UNKNOWN

5|P a ge

Fingerprint Recognition System

Contents:
Introduction Objective and scope Organization of the report Chapter 1 1.1 Literature Survey 5. Chapter 2 2.1 Introduction 2.2 What is Fingerprint Recognition? 2.3 How does Finger Recognition work? 6. Chapter 3 3.1 Basic Block Diagram 3.2 Circuit diagram 3.3 Algorithm 3.4 Main Components of Project 7. Chapter 4 4.1 Keil 4.2 Visual Basic 6.0 4.3 Software Developed 8. Chapter 5 5.1 Testing of Software 9. Future Prospectus and Conclusion 10. Appendix 1. 2. 3. 4.

page no.
8 10 11 12 13 20 21 23 24 29 30 31 33 35 43 44 46 53 58 59 61 62

6|P a ge

Fingerprint Recognition System

List of Figures:
Figure 1: Figure 2: Figure 3: Figure 4: Figure 5: Figure 6: Figure 7: Figure 8: Figure12: Minutiae of a Typical Fingerprint Block diagram Circuit Diagram Flow Chart Front view Side view Top view Form related to module Form granting staff leave to the employee 20 28 31 34 40 40 41 47 57 58

Figure 10: Form for the verification of the finger Figure 11: Form showing details of the employee after the fingerprint validation Figure9: Form for the com port setting

59 60 61 62

Figure13: Data flow diagram Figure 14: Crystal report to view the entry of the employee

7|P a ge

Fingerprint Recognition System

INTRODUCTION

Even if smog were a risk to human life we must remember that life in nature without technology is wholesale death. -Ayn Rand

8|P a ge

Fingerprint Recognition System

INTRODUCTION
Accurate automatic personal identification is critical in a variety of applications in our electronically interconnected society. Biometrics, which refers to identification based on physical or behavioral characteristics, is being increasingly adopted to provide positive identification with a high degree of confidence. Among all the biometric techniques, fingerprint-based

authentication systems have received the most attention because of the long history of fingerprints and their extensive use in forensics. Fingerprint and other biometric devices consist of a reader or scanning device, software that converts the scanned information in to a digital form ,and whenever the data is to be analyzed, a database that stores the biometric data for the comparison with previous records. When converting the biometric input the software identifies specific points of data as match points. The match points are processed using an algorithm compared with biometric data scanned when a user tries to gain access.

This project is very useful to the company and office in order to maintain the employee details. Details of the employee are maintained in the data base in PC. So we can easily cross verify the details. The employee details are stored by providing an ID no. to their finger impression.

9|P a ge

Fingerprint Recognition System

OBJECTIVE AND SCOPE:


The main objective of the project is to maintain a detailed record of the employees in on the basis of their finger impression, which will provide an easy access to the accurate details of the employee. Biometric recognition can provide better security higher efficiency and increased user convenience. A number of biometric technologies have been developed and several of them have being used In a variety of applications. Each biometric has its strengths and weakness and choice of a particular biometric depends on the requirement of the application. Various biometric identifiers can also be compared on the following factors: universality, distinctiveness, permanence collectability, performance, acceptability and circumvention. Because of the well known distinctiveness (individuality) and persistence properties of finger print over time, fingerprints are most widely used biometric characteristics. In fact fingerprint and biometric are often considered synonyms! Fingerprints have been routinely used in forensic community for over one hundred years and automatic fingerprint identification systems were first installed almost fifty years back. Fingerprint recognition is a complex pattern recognition problem; designing algorithm capable of extracting salient features and matching them in a robust way is quite hard, especially in poor quality fingerprint images. There is popular misconception that automatic Fingerprint recognition is a fully solved problem since it was one of the first applications of machine pattern recognition almost fifty years ago. On the contrary, fingerprint recognition is still challenging and important recognition problem.

10 | P a g e

Fingerprint Recognition System

ORGANIZATION OF THE REPORT


Chapter 1
Explains what is biometrics? & the different methods of implementing biometric system. This chapter gives the feature scope of the project and highlights of using the fingerprint.

Chapter 2
Gives theory related to the fingerprints. What are different issues related to the fingerprints, like what are the fingerprints , why are the fingerprint important and the structure of the fingerprint and feature of the fingerprint. Also explain how fingerprint is efficient than other types.

Chapter 3
Explains the block diagram, circuit diagram of the project . The working of each module is explained.

Chapter 4
Explain the working of the software

Chapter 5
Explain the testing and performance analysis i.e. the testing of different modules. It also gives the feature development.

11 | P a g e

Fingerprint Recognition System

CHAPTER 1

REVIEWE OF RELATED LITERATURE

12 | P a g e

Fingerprint Recognition System

LITERATURE SURVEY
What Are Biometrics?
Biometrics is automated methods of recognizing a person based on a physiological or behavioral characteristic. They include fingerprints, retinal and iris scanning, hand and finger geometry, voice patterns, facial recognition, and other techniques. The biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. Biometrics is expected to be incorporated in solutions to provide for Homeland Security including applications for improving airport security, strengthening our national borders, in travel documents, visas and in preventing ID theft. Now, more than ever, there is a wide range of interest in biometrics across federal, state, and local governments. Congressional offices and a large number of organizations involved in many markets are addressing the important role that biometrics will play in identifying and verifying the identity of individuals and protecting national assets. There are many needs for biometrics beyond Homeland Security...
y y y y y

Enterprise-wide network security infrastructures, Secure electronic banking, investing and other financial transactions, Retail sales, Law enforcement, and Health and social services

13 | P a g e

Fingerprint Recognition System


are already benefiting from these technologies. A range of new applications can been found in such diverse environments as amusement parks, banks, credit unions, and other financial organizations, Enterprise and Government networks, passport programs and driver licenses, colleges, physical access to multiple facilities (e.g., nightclubs) and school lunch programs. Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security. Trust in these electronic transactions is essential to the healthy growth of the global economy. Utilized alone or integrated with other technologies such as smart cards, encryption keys and digital signatures, biometrics are set to pervade nearly all aspects of the economy and our daily lives. Utilizing biometrics for personal authentication is becoming convenient and considerably more accurate than current methods (such as the utilization of passwords or PINs). This is because biometrics links the event to a particular individual (a password or token may be used by someone other than the authorized user), is convenient (nothing to carry or remember), accurate (it provides for positive authentication), can provide an audit trail and is becoming socially acceptable and inexpensive. The IWS Biometric Engine is a scalable, agnostic multi-biometric identity management solution that ensures only valid individuals gain access to controlled areas or attains secure documents. The IWS Biometric Engine is available as part of a Web-based, biometric enrollment and identity verification application. It is also available as a software developers kit (SDK) that enables system integrators to build custom identity
14 | P a g e

Fingerprint Recognition System


verification applications or incorporate biometric enrollment, search and authentication functionality into existing applications. The IWS Biometric Engine conducts 1:1 biometric searches to verify an individual's identity; 1:n searches to identify an individual within a population; and x:n investigative searches against watch lists and/or black lists. It is agnostic in biometric algorithm and hardware and can manage tens of millions of individuals using standard off-the-shelf hardware, minimizing the cost of ownership. Most importantly, the IWS Biometric Engine provides undisputable proof of identity across large-scale populations and distributed enterprises conveniently,

inexpensively and securely. The IWS Biometric Engine can be integrated into a variety of applications that can be deployed in a wide array of industries, such as:
y y y y y y y y

Driver License Systems National ID Systems Airport Security Border Control Systems Voter Identity Verification Access Control and Facilities Management Law Enforcement Systems Amusement & Events

The IWS Biometric Engine is based on field-proven IWS technology that has been used to manage millions of biometric templates and algorithms for virtually all leading biometric types including:
y y y

Fingercivil Fingerlivescan Facecivil


15 | P a g e

Fingerprint Recognition System


y y y y y y y

FaceNIST-compliant mug shots Iriscivil Hand Geometry PalmNIST Signature Voice 3D Face

Convenience vs. Security: How Well Do Biometrics Work:Can you be absolutely certain that a biometric device will work as claimed? Will it securely keep the bad guys out, while effortlessly letting the good guys in? In real life, security versus convenience turns out to be pretty much a non-issue, since the combination of biometric identification plus a keypad code provides virtually unbreakable security. Here's why. Biometric devices can be adjusted to favor security or user convenience. Think of a car alarm. When your car alarm is very sensitive, the probability of the bad guys stealing it is low. Yet the chance of your accidentally setting off the alarm is high. Reduce the sensitivity, and the number of false alarms goes down, but the chance of someone stealing your car increases. The security requirements of a national defense contractor might demand that the device at the front door be adjusted to keep the bad guys out, for example. On the other hand, if hundreds of employees will clock in using a biometric reader at a low-security facility, you'll want to adjust the unit's sensitivity to let the good guys in.

16 | P a g e

Fingerprint Recognition System


People like things that work. If the biometric doesn't allow employees effortless access, frustration will quickly rise and the biometric may never be accepted. Fortunately, this is extremely unlikely.

False Accept Rates


The probability that a biometric device will allow a bad guy to pass is called the "False Accept Rate." This figure must be sufficiently low to present a real deterrent. False Accept Rates claimed for today's biometric access systems range from 0.0001% to 0.1%. The biometric hand readers at the front entrances of 60% of the nuclear power plants in the U.S. have a False Accept Rate of 0.1%. It's important to remember that the only way a bad guy can get access is if a bad guy tries. Thus, the False Accept Rate must be multiplied by the number of attempts by bad guys to determine the number of possible occurrences.

False Reject Rates


For most applications, letting the good guys in is just as important as keeping the bad guys out. The probability that a biometric device won't recognize a good guy is called the "False Reject Rate." The False Reject Rates quoted for current biometric systems range from 0.00066% to 1.0%. A low False Reject Rate is very important for most applications, since users will become extremely frustrated if they're denied access by a device that has previously recognized them. An example may be helpful. A company with 100 employees has a biometric device at its front door. Each employee uses the door four times a day, yielding 400 transactions per day. A False Reject Rate of 1.0% predicts that every day, four
17 | P a g e

Fingerprint Recognition System


good guys (1% of 400) will be denied access. Over a five-day week, that means 20 problems. Reducing the False Reject Rate to 0.1% results in just two problems per week. A low False Reject Rate is very important for most applications, since users will become extremely frustrated if they're denied access by a device that has previously recognized them. As mentioned previously, the combination of a low False Reject Rate plus a simple keypad code provides virtually unbreakable security.

Equal Error Rates


Error curves give a graphical representation of a biometric device's "personality." The point where false accept and false reject curves cross is called the "Equal Error Rate." The Equal Error Rate provides a good indicator of the unit's performance. The smaller the Equal Error Rate, the better.

Validity of Test Data: - Testing biometrics is difficult, because of the


extremely low error rates involved. To attain any confidence in the statistical results, thousands of transactions must be examined. Some error rates cited by manufacturers are based on theoretical calculations. Other rates are obtained from actual field testing. Field data are usually more reliable. In the case of False Reject rates, only field test data can be considered accurate, since biometric devices require human interaction. For example, if the device is hard to use, false reject rates will tend to rise. A change in the user's biometric profile could also cause a false reject (a finger is missing, for example). None of these conditions can be accurately quantified by purely theoretical calculations. On the other hand, False Accept Rates can be calculated with
18 | P a g e

Fingerprint Recognition System


reasonable accuracy from cross-comparison of templates in large template databases. Currently, most field test error rates have been generated by various biometric manufacturers using end-user data. Tests have also been conducted by independent laboratories such as the U.S. Department of Energy's Sandia National Laboratories. The most recent test released by Sandia was performed in 1991. It's important to remember that error rates are statistical: they are derived from a series of transactions by a population of users. In general, the larger the population and the greater the number of transactions, the greater the confidence level in the accuracy of the results. If the error rate is reported at 1:100,000, and only 100 transactions were included in the study, the confidence level in the results should be very low. If the same error rate was reported for 1 million transactions, the confidence level would be much higher. The magnitude of the reported results affects the size of the sample required for a reasonable confidence level. If the reported error rate is 1:10, then a sample of 100 transactions may provide a sufficient confidence level. Conversely, a 100transaction sample would be too small if the error rate was reported as 1:100,000.

Conclusion: Security and Convenience are a Fact


Biometric devices are extremely secure, thanks to the combination of low False Accept Rates at moderate sensitivity settings, combined with a short user keypad code. At the same time, biometrics is extremely convenient and error-free, thanks to low False Reject Rates.
19 | P a g e

Fingerprint Recognition System

CHAPTER 2

BASIC OF FINGERPRINT

20 | P a g e

Fingerprint Recognition System 2.1 INTRODUCTION


Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behavioral characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format. This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as the unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow.) Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option. Based on centuries of experience and extensive research, fingerprints are at present considered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition. Physiologically, a fingerprint is a configuration of ridges that contain individual pores, separated by valleys. These are supported by the underlying structure of blood vessels immediately below the skin. The morphology (shape) of a fingerprint finger print is associated with specific electrical and thermal characteristics of the

21 | P a g e

Fingerprint Recognition System


supporting skin. This means that light, heat or electrical capacitance (or a combination of these) may be used to capture fingerprint images. A fingerprint is established during fetal development, it does not change as a person ages, and it regrows to its original pattern after an injury. After reaching adulthood, a persons fingerprints remain the same size. Identical twins do not have identical fingerprints. A small percentage of the population (for example miners or musicians) has fingerprints that are permanently disfigured by manual activities. In developed countries this proportion is decreasing and does not constitute a significant problem for fingerprint-based recognition systems. There are several algorithmic methods for extracting a characteristic template from a fingerprint. The most popular methods are based on pattern recognition or minutiae extraction. In the case of minutiae-based algorithms, a fingerprint is characterized by gross features such as arches, loops and whorls, and fine features (minutiae), principally bifurcations, deltas (Y-shaped junctions) and terminations of ridges. Typically, between 30 and 40 minutiae are present in a fingerprint. Each of these is characterized by its position (co-ordinates), type (bifurcation, delta or termination) and orientation.

Figure 1: Minutiae of a Typical Fingerprint The set of these minutiae characteristics can provide a template for a fingerprint. Provided that these characteristics are measured sufficiently accurately,
22 | P a g e

Fingerprint Recognition System


the probability of two different fingerprints having identical templates is extremely low. Electronic imaging technology and pattern recognition algorithms are now sufficiently advanced for the template of a fingerprint to be extracted automatically. In many cases standards exist for the extracted template. These standards are normally for minutia based templates, the most notable being from the USA National Institute of Standards and Technology (NIST). However, adherence to a standard almost always limits the flexibility of the algorithm developer, and restricts the use of their proprietary intellectual property (IP). Thus there is often a tradeoff between adherence to a standard versus accuracy and speed when considering standardization Do you need a better authentication method than just a password for access to critical information? Do you want to set up a more secure environment for your employees and assets? For higher security - fingerprint recognition. Fingerprint recognition provides a great solution for doors, computer room access, desktop login authentication, and application integration. Fingerprint recognition provides a low cost biometrics solution and with its small designs makes it a prime choice when setting up a high security solution.

2.2 What Is Fingerprint Recognition?


Fingerprint recognition is a biometric security method that integrates with applications and other technologies to provide a way to identify a person by scanning a persons fingerprint to gain access. Fingerprint recognition is a way to provide higher security because a fingerprint biometric system does not use any passwords or pin #s but only valid fingerprints.

23 | P a g e

Fingerprint Recognition System 2.3 How Does Fingerprint Recognition Works?


Because there are several fingerprint recognition solutions that are available today, we will only give you a general outline of how fingerprint recognition can work.
y

The first step is to setup your fingerprint recognition devices and scan all fingerprints that will have access. You will only need to do this once as the fingerprint recognition device stores the fingerprints as templates in a mathematical algorithm form. Depending on your setup, the device may store this in a database or use smart card technology for local storage of these fingerprint

templates.
y

When an individual is wanting access, the individual must put their finger on the fingerprint recognition device or depending on the system, you may only need to put it close to the fingerprint scanning area. The fingerprint recognition device then captures the individuals fingerprint and puts in into a template form using a mathematical algorithm and compares it to its database or storage of fingerprints to determine if it matches any existing fingerprints. If the fingerprint device finds a match then access is granted.

Fingerprint Authentication - The Time Has Finally Arrived


It has been more than 15 years since the introduction of commercial fingerprint authentication systems. Yet they are just now gaining broad acceptance. We should
24 | P a g e

Fingerprint Recognition System


not be surprised. Many technologies required several years before the right combination of factors allowed them to become ubiquitous. If one looks back to laptop computers, cell phones, fax machines, pagers, laser printers and countless other everyday devices, one will realize most had long gestation periods. Biometrics is now at the acceptance crossroads. What will propel them into common usage?

Convenience First - There is the reason end-users should use fingerprint


authentication in the IT world, i.e. security, and there is the reason they WILL use it, convenience. The simple fact is that passwords don't work very well. They are "nocost" to establish, but very expensive to maintain. Just ask the help desk manager in a major corporation. More than 50 percent of all help desk calls are related to passwords 3&Mac218;4 lost, forgotten or otherwise useless. Count all the passwords you use everyday and often have to change once a month. Password administration is a nightmare for MIS managers and users. Fingerprint authentication eliminates the problem, and the headaches. Other authentication mechanisms such as tokens, smart cards, etc. require you to carry something. This is better than a password, but easier to lose. Think about losing your credit card or driver's license. Losing your corporate network access card could be a lot worse. Information is valuable and harder to track than money. Fingerprints can also act as a simple, trusted and convenient user-interface to a well thought out security architecture. The two components need each other to provide truly effective security. A user authenticated via fingerprints can take advantage of a solid security system with minimal education.

Simple Truths - Users don't trust what they don't understand. Most IT security
concepts are incomprehensible to the common user. Explaining public and private
25 | P a g e

Fingerprint Recognition System


keys, key recovery systems and digital certificates is beyond the skills of even experienced MIS professionals. Most users have no concept of encryption algorithms and their implementations, nor do they want to understand. Users want simple, trusted security. Simple, as in put your finger down. It does not take a security professional to realize that 10 passwords on sticky notes attached to your monitor are poor security. Most breaches of security require doing the obvious, and are often done by insiders. Trusted, as in having stood the test of time. Fingerprints have been used for identification for over 100 years. They are the standard without question. In addition to signatures, fingerprints are the only other form of identification that have a legal standing. A key issue of trust is privacy. The best way to maintain that is to store a template of unique fingerprint characteristics instead of the entire print. This is sufficient for one-to-one or one-to-many matching and eliminates the need for a database of searchable fingerprints.

Emerging Standards - IT professionals insist upon standards, multiple sources


of supply and endorsement by industry leaders. It's beginning to happen, but to think that a small biometrics company can set an industry standard is ludicrous. Yet many have tried. Any CIO or MIS manager would not bet his job or company on a proprietary solution from a small biometrics company. These people want choice and standards to provide multiple sources of supply and fair competition among vendors. The one exception to this rule is when there has been a major catastrophe,
26 | P a g e

Fingerprint Recognition System


such as a significant loss of money. However, it is tough to build a sustainable business chasing disasters.Standards need to be set by the IT industry leaders such as Intel, Microsoft, Phoenix Technologies and the top 10 computer companies.

Cost - Just as in the early days of desktop computers when a system cost more
than 100,000 Rs only a few people had systems. Now when they cost less than 20000 Rs, everybody has one. This same "order of magnitude" cost breakthrough has recently occurred with fingerprint technology. What cost 40,000 two years ago is now available for less than 20,000. Cost alone is not the answer, but it is a necessary component of broad market acceptance of this technology.

Complete Solutions - Lots of companies talk about "complete solutions," but


what does this mean? It does not mean a custom, proprietary combination of fingerprint sensor, matching software and application software - point products and closed solutions are not acceptable. It does mean an open architecture where the sensor, matching algorithm and applications are interchangeable and leverageable. Veridicom's OpenTouchTM architecture embraces this tenet and lets the user choose.

Measurable Usefulness - Being able to accurately gauge the usefulness of a


fingerprint authentication solution is very important. This technology saves money in password administration, user up-time and user support. More importantly fingerprint authentication allows you to do more with a computer. Now, remote secure network access is possible. Electronic commerce makes sense when the authentication is trusted. It is a fact that 75 percent of all Internet users are

27 | P a g e

Fingerprint Recognition System


uncomfortable transmitting their credit card information over the public network. Imagine if this was never an issue. Fingerprint authentication is an enabling technology for trusted e-commerce. All the signs are in the market for the acceptance of fingerprint authentication as a simple, trusted, convenient method of personal authentication. Industry leaders are validating the technology through standards initiatives. Cost and performance breakthroughs have transformed fingerprint biometrics from an interesting technology to an easy to implement authentication solution. Industry trends such as electronic commerce and remote computing exacerbate the need for better authentication. Most importantly, users understand and accept the concept. Passwords and tokens are universally disliked. You can't get much simpler than a fingerprint.

28 | P a g e

Fingerprint Recognition System

CHAPTER 3

OVER VIEW OF PROJECT AND HOW IT WORKS

29 | P a g e

Fingerprint Recognition System


3.1 BASIC BLOCK DIAGRAM:

Finger Print Sensor

Serial interface Micro Controller

Rs232

PC

Power supply

Figure 2: Block diagram

BLOCK DIAGRAM DESCRIPTION:


In this project microcontroller is interfaced with PC through RS 232 converter. The RS232 is used to convert TTL logic to RS 232 logic. The microcontroller transfers the related information to PC. When human places the finger on the finger print sensor, the sensor sends the corresponding data to microcontroller. Here the microcontroller is the flash type reprogrammable microcontroller in which we have already programmed. Microcontroller received the data from the finger print sensor. Then compared with stored data if the person finger is valid for the ID no. in the fingerprint sensor memory , the microcontroller displays the information as Found ID= (ID no.) on the LCD display. The key pad consists of set of key in which each key represents

30 | P a g e

Fingerprint Recognition System


candidate name or symbol. If the person finger print is not valid for that particular ID no. , the microcontroller will display the Authentication Fail. On the other hand when the fingerprint matches the employee details will be displayed on the computer screen. If required the administrator may manipulate the details of the employee. 3.2 CIRCUIT DIAGFRAM

Figure 3: Circuit Diagram


31 | P a g e

Fingerprint Recognition System Component Values:


DIODES: D1 & D2 (LED) D3 (IN4007)

CAPACITORS: C1, C2 = 100n C3, C4, C5, C6, C7 = 10F C8, C9 = 33p

RESISTORS: R1 = 470 R2, R4 = 10 K R3 = 1K RNI = 10 K

TRANSISTOR: Q1 = BC547

ICS: U2 AT89S52 U3 MAX232

SWITCHES: SW1, SW2, SW3, SW4, SW5

32 | P a g e

Fingerprint Recognition System

4.3 Algorithm:
1. Start 2. Place the finger on the fingerprint sensor 3. Check the impression 4. Operations to be performed .i.e. add, delete, search, read. 5. If add add the data to database. 6. If delete remove the data from the database. 7. If search, then display the result. 8. stop

33 | P a g e

Fingerprint Recognition System


Flow chart

Figure 4: Flow Chart


34 | P a g e

Fingerprint Recognition System

3.4 Main components of the project


MICROCONTROLLER (AT89S52):
The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8K bytes of in-system programmable Flash memory. The device is manufactured using Atmels high-density nonvolatile memory technology and is compatible with the industry- standard 80C51 instruction set and pinout. The on-chip Flash allows the program memory to be reprogrammed insystem or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller which provides a highly-flexible and cost-effective solution to many embedded control applications.

The AT89S52 provides the following standard features: y 8K bytes of Flash, y 256 bytes of RAM, y 32 I/O lines, y Watchdog timer, y two data pointers, y three 16-bit timer/counters, y a six-vector two-level interrupt architecture, y a full duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes.

35 | P a g e

Fingerprint Recognition System


The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. The Power-down mode saves the RAM contents but freezes the oscillator, disabling all other chip functions until the next interrupt or hardware reset.

POWER SUPPLY:
The performance of the master box depends on the proper functioning of the power supply unit. The power supply converts not only A.C into D.C, but also provides output voltage of 5V, 1 amp. The essential components of the power supply are Transformer, four diodes which forms bridge rectifier, capacitor which work as a filter and positive voltage regulator IC 7805

RS232-SETUP:
Interfacing the hard ware with the PC has the following advantages: y Storing and retrieval of data becomes easier. y Networking can be done and hence the entire system can be monitored online. y Access can be user friendly. Interfacing the hard ware with the PC is done using MAX232 (rs232) The MAX220MAX249 family of line drivers/receivers is intended for all EIA/TIA-232E and V.28/V.24 communications interfaces, particularly applications where 12V is not available. These parts are especially useful in battery-powered systems, since their low-power shutdown mode reduces power dissipation to less than 5 W. The MAX225, MAX233, MAX235, and MAX245/MAX246/MAX247 use no external components and are recommended for applications where printed circuit board space is critical.

36 | P a g e

Fingerprint Recognition System Features:


y Operate from Single +5V Power Supply (+5V and +12VMAX231/MAX239) y Low-Power Receive Mode in Shutdown (MAX223/MAX242) y Meet All EIA/TIA-232E and V.28 Specifications y Multiple Drivers and Receivers y 3-State Driver and Receiver Outputs y Open-Line Detection (MAX243)

FINGER PRINT SENSOR:


The selection of an appropriate fingerprint reader based on your environment, user base, transaction throughput, and budget plays an important role in the overall success of your biometric technology initiative. SM630 background highlight optical fingerprint verification module is the latest release of Miaxis Biometrics Co., Ltd. It consists of optical fingerprint sensor, high performance DSP processor and Flash. It boasts of functions such as fingerprint Login, fingerprint deletion, fingerprint verification, fingerprint upload, fingerprint download, etc. Compared to products of similar nature, SM630 enjoys the following unique features: Self-proprietary Intellectual Property Optical fingerprint collection device, module hardware and fingerprint algorithm are all self developed by Miaxis. High Adaptation to Fingerprints When reading fingerprint images, it has self-adaptive parameter adjustment mechanism, which improves imaging quality for both dry and wet fingers. It can be applied to wider public.

37 | P a g e

Fingerprint Recognition System


Low Cost Module adopts Miaxis optical fingerprint collection device, which dramatically lowers the overall cost. Algorithm with Excellent Performance SM630 module algorithm is specially designed according to the image generation theory of the optical fingerprint collection device. It has excellent correction & tolerance to deformed and poor-quality fingerprint. Easy to Use and Expand User does not have to have professional know-how in fingerprint verification. User can easily develop powerful fingerprint verification application systems based on the rich collection of controlling command provided by SM630 module. All the commands are simple, practical and easy for development. Low Power Consumption Operation current <80mA, specially good for battery power occasions. Integrated Design Fingerprint processing components and fingerprint collection components are integrated in the same module. The size is small. And there are only 4 cablesconnecting with HOST, much easier for installation and use.

38 | P a g e

Fingerprint Recognition System

Technical Specifications

Operating Voltage Operating Current Fingerprint Template Search Time Power-on Time

4.3V6V 80mA Input voltage 5V 768 templates 1.5s (200 fingerprint, average value in test) 200msTime lapse between module poweron to module ready to receive instructions 45 64KByte Standard serial interface TTL level 57600bps temperature: -10C+40C

Tolerated Angle Offset User Flash Memory Interface Protocol Communication Baud Rate Operating Environment

39 | P a g e

Fingerprint Recognition System Specification & Interface of the fingerprint sensor Dimension

Figure 5: Front view

Figure 6: Side view


40 | P a g e

Fingerprint Recognition System

Figure 7: Top view

Electrical Interface
Module is connected to HOST via 4PIN cable. The PIN definition is as follows: No. PIN Definition Remarks 1 Power supply Power supply +

2 Module Tx Open-drain output, need to use pull-up resistance in application (Typical value: 10K ) 3 Module Rx Wide voltage input, 7V affordable 4 Power supply Power supply

PERSONAL COMPUTERS:
41 | P a g e

Fingerprint Recognition System

A small, relatively inexpensive computer designed for an individual user. In price, personal computers range anywhere from a few hundred dollars to thousands of dollars. All are based on the microprocessor technology that enables manufacturers to put an entire CPU on one chip. At home, the most popular use for personal computers is for playing games. Personal computers first appeared in the late 1970s. One of the first and most popular personal computers was the Apple II, introduced in 1977 by Apple computer. During the late 1970s and early 1980s, new models and competing operating system seemed to appear daily. Then, in 1981, IBM entered the fray with its first personal computer, known as the IBM PC. The IBM PC quickly became the personal computer of choice, and most other personal computer manufacturers fell by the wayside. One of the few companies to survive IBM's onslaught was Apple Computer, which remains a major player in the personal computer marketplace.

42 | P a g e

Fingerprint Recognition System

CHAPTER 4

SOFTWARE SPECIFICATIONS AND ITS WORKING

SOFTWARE SPECIFICATIONS:
4.1 KEIL
43 | P a g e

Fingerprint Recognition System Keil c compiler:


Keil development tools for the 8051 Microcontroller Architecture support every level of software developer from the professional applications engineer to the student just learning about embedded software development. The industry-standard Keil C Compilers, Macro Assemblers, Debuggers, Realtime Kernels, Single-board Computers, and Emulators support all 8051 derivatives and help you get your projects completed on schedule The Keil 8051 Development Tools are designed to solve the complex problems facing embedded software developers. Using a high-level language like C has many advantages over assembly language programming: 1. Knowledge of the processor instruction set is not required. Rudimentary knowledge of the memory structure of the 8051 CPU is desirable. 2. Details like register allocation and addressing of the various memory types and data types is managed by the compiler. 3. Programs get a format structure (which is imposed by the C programming language) and can be divided into separate functions. This contributes to source code reusability as well as better overall application structure. 4. The ability to combine variable selection with specific operations improves program readability. 5. Keywords and operational functions that more nearly resemble the humans thought process may be used. 6. Programming and program test time is drastically reduced. 7. The C run-time library contains many standard routines such as: formatted output, numeric conversions, and floating point arithmetic.

44 | P a g e

Fingerprint Recognition System


8. Existing program parts can be more easily included into new programs because of modular program construction techniques. 9. The language C is a very portable language (based on the ANSI standard) that enjoys wide popular support and is easily obtained for most systems. Existing program investment s can be quickly adapted to other processors as needed.

Software Development Cycle in KEIL


When we use Keil software tools, the project development cycle is roughly the same as it is for any other software development project. 1. Create a project, select the target chip from the device database, and configure the toll settings. 2. Create source file in C or assembly. 3. Build your application with the project manager. 4. Correct errors in the source files. 5. Test the linked application. A block diagram of the complete 8051 tool set may best illustrate the development cycle.

4.2 VISUAL BASIC 6.0

45 | P a g e

Fingerprint Recognition System


The Structure of a Visual Basic Application: An application is really nothing more than a set of instructions directing the co mputer to perform a task or tasks. The structure of an application is the way in which the instructions are organized; that is, where the instructions are stored and the order in which instructions are executed. Simple applications such as the classic "hello world" exa mple have a simple structure; organization isn't very important with a single line of code. As applications beco me more co mplex, the need for organization or structure becomes obvious. Imagine the chaos that would result if your application's code was allowed to execute in random order. In addition to controlling the execution of an application, the structure is important to the progra mmer: how easily can you find specific instructions within your application? Because a Visual Basic application is based on objects, the structure of its code closely models its physical representation on screen. By definition, objects contain data and code. The form that you see on screen is a representation of the properties that define its appearance and intrinsic behavior. For each form in an application, there is a related form module (with file name extension .frm) that contains its code.

46 | P a g e

Fingerprint Recognition System

Figure 8: form related to module Each form module contains event procedures sections of code where you place the instructions that will execute in response to specific events. Forms can contain controls. For each control on a form, there is a corresponding set of event procedures in the form module. In addition to event procedures, form modules can contain general procedures that are executed in response to a call from any event procedure.

Visual Basic Programming:


Visual Basic provides you with a complete set of tools to simplify rapid application develop ment. So what is Visual Basic? The "Visual" part refers to the method used to create the graphical user interface (GUI). Rather than writing numerous lines of code to describe the appearance and location of interface elements, you simply add prebuilt objects into place on screen. If you've ever used a drawing program such as Paint, you

47 | P a g e

Fingerprint Recognition System


already have most of the skills necessary to create an effective user interface. The "Basic" part refers to the BASIC (Beginners All-Purpose Symbolic Instruction Code) language, a language used by more progra mmers than any other language in the history of computing. Visual Basic has evolved fro m the original BASIC language and now contains several hundred state ments, functions, and keywords, many of which relate directly to the Windows GUI. Beginners can create useful applications by learning just a few of the keywords, yet the power of the language allows professionals to acco mplish anything that can be accomplished using any other Windows programming language. The Visual Basic progra mming language is not unique to Visual Basic. The Visual Basic progra mming system, Applications Edition included in Microsoft Excel, Microsoft Access, and many other Windows applications uses the same language. The invest ment you make in learning Visual Basic will carry over to these other areas.Whether your goal is to create a small utility for yourself or your work group, a large enterprise-wide syste m, or even distributed applications spanning the globe via the Internet, Visual Basic has the tools you need. Data access features allow you to create databases, front-end applications, and scalable server-side components for most popular database formats, including Microsoft SQL Server and other enterprise-level databases. ActiveX technologies allow you to use the functionality provided by other applications, such as Microsoft Word word processor, Microsoft Excel spreadsheet, and other Windows applications. You can even automate applications and objects created using the Professional or Enterprise editions of Visual Basic. Internet capabilities make it easy to provide access to documents and applications across the Internet or intranet fro m within your application, or to create Internet server applications.
48 | P a g e

Fingerprint Recognition System


Your finished application is a true .exe file that uses a Visual Basic Virtual Machine that you can freely distribute.

Visual basic forms, dlls, Modules:


Visual basic forms: Forms are objects that expose properties which define their appearance, methods which define their behavior, and events which define their interaction with the user. By setting the properties of the form and writing Visual Basic code to respond to its events, you customize the object to meet the require ments of your application. Controls are objects that are contained within form objects. Each type of control has its own set of properties, methods and events that make it suitable for a particular purpose. Some of the controls you can use in your applications are best suited for entering or displaying text. Other controls let you access other applications and process data as if the re mote application was part of your code. When you work with forms and controls, set their properties, and write code for their events at design time, which is any time you're building an application in the Visual Basic environment. Run time is any time you are actually running the application and interacting with the application as the user would. Code that isn't related to a specific form or control can be placed in a different type of module, a standard module (.BAS). A procedure that might be used in response to events in several different objects should be placed in a standard module, rather than duplicating the code in the event procedures for each object. Code M odules: Code in Visual Basic is stored in mo dules. There are three kinds of modules: form, standard, and class. Simple applications can consist of just a single form, and all of the code in the application resides in that form module. As your applications get larger and more sophisticated, you add additional
49 | P a g e

Fingerprint Recognition System


forms. Eventually you might find that there is common code you want to execute in several forms. You don't want to duplicate the code in both forms, so you create a separate module containing a procedure that implements the co mmon code. This separate module should be a standard module. Over time, you can build up a library of modules containing shared procedures. Each standard, class, and form module can contain: Declarations. You can place constant, type, variable, and dyna mic-link library (DLL) procedure declarations at the module level of form, class or standard modules. Procedures. A Sub, Function, or Property procedure contains pieces of code that can be executed as a unit. These are discussed in the section "Procedures" later in this chapter. Form Modules: Form modules (.FRM file name extension) are the foundation of most Visual Basic applications. They can contain procedures that handle events, general procedures, and form-level declarations of variables, constants, types, and external procedures. If you were to look at a form module in a text editor, you would also see descriptions of the form and its controls, including their property settings. The code that you write in a form module is specific to the particular application to which the form belongs; it might also reference other forms or objects within that application. Standard Modules: Standard modules (.BAS file name extension) are containers for procedures and declarations commonly accessed by other modules within the application. They can contain global (available to the whole application) or module-level declarations of variables, constants, types, external procedures, and global procedures. The code that you write in a standard module isn't necessarily tied to a particular application; if you're careful not to reference forms or controls by na me, a standard module can be reused in many different applications.
50 | P a g e

Fingerprint Recognition System


Class Modules: Class modules (.CLS file name extension) are the foundation of object-oriented progra mming in Visual Basic. You can write code in class modules to create new objects. These new objects can include your own customized properties and methods. Actually, forms are just class modules that can have controls placed on the m and can display form windows. The Dynamic Link Libraries (DLLs) A Windows term for a set of routines that can be called fro m procedures and are loaded and linked into your application at run time. DLLs include utility routines or specific functions not intrinsic to Microsoft Windows. Accessing DLLs and the Windows API: When you need capabilities that go beyond the core language and controls provided with Microsoft Visual Basic, you can make direct calls to procedures contained in dynamic-link libraries (DLLs). By calling procedures in DLLs, you can access the thousands of procedures that form the backbone of the Microsoft Windows operating syste m, as well as routines written in other languages. As their name suggests, DLLs are libraries of procedures that applications can link to and use at run time rather than link to statically at compile time. This means that the libraries can be updated independently of the application, and many applications can share a single DLL. Microsoft Windows itself is comprised of DLLs, and other applications call the procedures within these libraries to display windows and graphics, manage me mory, or perform other tasks. These procedures are sometimes referred to as the Windows API, or application programming interface. Using a DLL Procedure in Your Application: Because DLL procedures reside in files that are external to your Visual Basic application, you must specify where the procedures are located and identify the arguments with which they should be called.
51 | P a g e

Fingerprint Recognition System


You provide this information with the Declare statement. Once you have declared a DLL procedure, you can use it in your code just like a native Visual Basic procedure. Important When you call any DLLs directly fro m Visual Basic, you lose the built-in safety features of the Visual Basic environment. This means that you increase the risk of system failure while testing or debugging your code. To minimize the risk, you need to pay close attention to how you declare DLL procedures, pass arguments, and specify types. In all cases, save your work frequently. Calling DLLs offers you exceptional power, but it can be less forgiving than other types of programming tasks. In the following example, we'll show how to call a procedure from the Windows API. The function we'll call, SetWindowText, changes the caption on a form. While in practice, you would always change a caption by using Visual Basic's Caption property, this exa mple offers a simple model of declaring and calling a procedure. Declaring a DLL Procedure: The first step is to declare the procedure in the Declarations section of a module: Private Declare Function SetWindowText Lib "user32" _ Alias "SetWindowTextA" (ByVal hwnd As Long, _ ByVal lpString As String) As Long You can find the exact syntax for a procedure by using the API Viewer application, or by searching the Win32api.txt file. If you place the Declare in a Form or Class module, you must precede it with the Private keyword. You declare a DLL procedure only once per project; you can then call it any number of times. Calling a DLL Procedure: After the function is declared, you call it just as you would a standard Visual Basic function. Here, the procedure has been attached to the Form Load event: Private Sub Form_Load()
52 | P a g e

Fingerprint Recognition System


SetWindowText Form1.hWnd, "Welcome to VB" End Sub When this code is run, the function first uses the hWnd property to identify the window where you want to change the caption (Form1.hWnd), and then changes the text of that caption to "Welco me to VB." Remember that Visual Basic can't verify that you are passing correct values to a DLL procedure. If you pass incorrect values, the procedure may fail, which may cause your Visual Basic application to stop. You'll then have to reload and restart your application. Take care when experimenting with DLL procedures and save your work often. The DCAS VB Source Code: The software for The DCAS was developed in Visual Basic 6.0 the software does the following 1. verify the access code 2. control the stepper motor 3. logging the user entries The source code for this application has been given below. The source code has been seperatd into two parts for better understanding. They are 1. Form code. 2. module code. 3. Form layout.

4.3 SOFTWARE DEVELOPED FINGERPRINT RECOGNITION SYSTEM


We have created a software for the fingerprint recognition system . The steps to use the software are as follows: 1. Select the COM port.
53 | P a g e

Fingerprint Recognition System


2. Place the finger on the fingerprint module for verification. 3. Add the entry of the other employee staff by pressing the add button on the circuit. 4. You can generate the report by clicking on the drop down list of the Report menu

The main Moto of the software is to save the database of the employee on the basics of their fingerprint that may represent a unique method for the identification of the employee. Thus for this we have used the computer to present the software front end and fingerprint module to save the finger impression of the person. Images of the Fingerprint Recognition System are as follows:

Figure9:Form for the com port setting.


54 | P a g e

Fingerprint Recognition System

Figure 10: form for the verification of the finger.

Figure 11: form showing details of the employee after the fingerprint validation
55 | P a g e

Fingerprint Recognition System

Figure12: form granting staff leave to the employee

56 | P a g e

Fingerprint Recognition System Data Flow Diagram:

Figure13: Data flow diagram

Figure 14:Crystal report to view the entry of the employe.


57 | P a g e

Fingerprint Recognition System

Chapter 5

Testing & Conclusion

58 | P a g e

Fingerprint Recognition System 5.1 Testing of the software


Software testing is the most important part of the software development. Software testing helps to identify correctness, completeness, security and quality of developed computer software. So we have made the test cases to check the software. The example of our test case is as follows: Fingerprint Recognition System Test Case Description Input ID 1 Fingerprint sensor 1.1 Place the finger finger placed on the sensor 2 2.1 3 3.1 Expected Result Actual Result Status

Provide the id ID Provided to the finger print id accepted

PASS

Staff-Biodata Enter the id on id on the sensor id accepted the staff biodata Load Picture keep empty the form should not be saved large size image image should fit the picture box select com port Invalid Port other then number present in system

PASS

Complete the form properly image spreads out of picture box Invalid Port number

PASS

3.2

Load Picture

FAIL

4 4.1

COM port selection Telephone number Telephone number

PASS

5 5.1

enter the number It should not more than accept the required number

the number is accepted

FAIL

59 | P a g e

Fingerprint Recognition System


Fingerprint Recognition System Test Case Description ID 6 EXIT 6.1 Select exit option Input Expected Result the program should terminate Actual Result Status

Select

program is terminated

PASS

As you see there are some test cases which have the status as FAIL we have also overcome those test cases after the testing you may view the changes when you will run the software. For example: One can not enter the telephone number greater than 11 digits. as the max length is set to 11.

60 | P a g e

Fingerprint Recognition System

Future Prospectus:
 The future work of this will be at the airport where in the data will be stored in the PC so that the fraud which takes place will become less.  The matching process can be made more efficient by increasing the number of sectors in the region of interest.

Conclusion

Fingerprint recognition system will provide high level of assurance that the individual that is accessing a particular area is who they say they are. This means that the password hacking , password key maintenance and additional needs for guards to secure a physical or logical area will be minimized or eliminated . Biometric devices set up an audit trial that could be placed directly into any standard computer application(i.e. application like Microsoft word or excel, operating system like windows - xp, etc.) Thus we conclude that It is an easy way to secure the database and maintain the security level on the basis of the fingerprint.

61 | P a g e

Fingerprint Recognition System

Appendix
Components used Quantity Cost ( .Rs)

Microcontroller Board
A. Semiconductor 1. AT89S52 microcontroller 2. MAX232 3. AT24C02 4. SM-630 [Fingerprint module] 5. BC547 (transistor) 6. LED 7. 1n4007 (diode) B. Passive components 1. 10F capacitor 63V 2. 100nF Ceramic capacitor 3. 33pF 4. Resistors (i). 470 (ii). 10 k 1/4w 1/4w 1 2 1 0.50 0.50 3 5 2 2 3 1 0.50 1 1 1 1 1 2 1 55 22 8 4000 2 3 1

(iii). 10 k register array SIL9 5. Switches Push to on 6. Crystal 11.0592 MHz 7. IC base 40 pin 8 pin

1 1

5 2

62 | P a g e

Fingerprint Recognition System


Components used Quantity Cost( .Rs)

16 pin 8. DB9RS232 male connector 9. Serial port connector (F to F) 10. Connecting wires 11. PCB 12. Buzzer 3- 27 v 13. Connectors

1 1 2

3 25 75 10 100

25 40

Power Supply
Components used A. Semiconductors 1. LM7805 2. 1n4007 (diode) 3. LED B. Passive components 1. 470 1/4w 1 1 1 2 1 1 0.50 10 5 1 65 100
63 | P a g e

Quantity

Cost( .Rs)

1 4 1

8 1 1.50

2. 1000 F capacitor 25v 3. 100 F capacitor 25v 4. 100nF capacitor 50v 5. Transformer X mar 0-12v 6. PCB

Fingerprint Recognition System


7. Mains cord 8. Heat sink 9. Programming( visha kits) 1 1 15 5 50

Working hours utilized per day 4hrs

The total cost of project components reaches up to 4649 Rs But keeping in mind the sincerity and the hard work of the members as well as the development of the software, we predict the cost of our total project up to 9000 Rs.

64 | P a g e

You might also like