DESIGN AND CONSTRUCTION OF A FINGERPRINT AUTENTICATION SYSTEM
USER'S INSTRUCTIONS: The project work you are about to view is on "design and construction of a fingerprint authentication system". Please, sit back and study the below research material carefully. This project topic (design and construction of a fingerprint authentication system) have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this "design and construction of a fingerprint authentication system" project research material is to reduce the stress of moving from one school library to another all in the name of searching for "design and construction of a fingerprint authentication system" research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.
TITLE PAGE
BY
---
--/H2013/01430
DEPARTMENT OF ----
SCHOOL OF ---
INSTITUTE OF ---
DECEMBER,2018
APPROVAL PAGE
This is to certify that the research work, "design and construction of a fingerprint authentication system" by ---, Reg. No. --/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on --- has been approved.
By
--- . ---
Supervisor Head of Department.
Signature………………. Signature……………….
……………………………….
---
External Invigilator
DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.
ACKNOWLEDGEMENT
The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.
PROJECT DESCRIPTION: This work "design and construction of a fingerprint authentication system" research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of "design and construction of a fingerprint authentication system" visible for everyone, then the complete material on "design and construction of a fingerprint authentication system" is to be ordered for. Happy viewing!!!
We are in an era of greater security risk and increasing regulation, more organizations are implementing strong authentication to protect their data and meet regulatory compliance demands. Of the broad variety of strong authentication device options, fingerprint biometrics provides strong authentication and user convenience. Fingerprint biometrics are highly reliable because they cannot be easily faked, altered or misappropriated.
Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric data are separate and distinct from personal information. Biometric templates cannot be reverse-engineered to recreate personal information and they cannot be stolen and used to access personal information. This project is based on biometric using fingerprint.
TABLE OF CONTENTS
COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
- PROBLEM STATEMENT
- AIM/OBJECTIVE OF THE PROJECT
- SIGNIFICANCE OF THE PROJECT
- APPLICATIONS OF THE PROJECT
- SCOPE OF THE PROJECT
- LIMITATION OF THE PROJECT
- OPERATIONAL DEFINITION OF TERMS
CHAPTER TWO
LITERATURE REVIEW
- OVERVIEW OF BIOMETRICS
- BIOMETRIC FUNCTIONALITY
- REVIEW OF FINGER PRINT
- THE HISTORICAL BACKGROUND OF FINGERPRINTS
- FINGERPRINT RECOGNITION
- HISTORICAL BACKGROUND OF BIOMETRICS
CHAPTER THREE
SYSTEM DESIGN
- BLOCK DIAGRAM OF THE SYSTEM
- FUNCTION BLOCKS OF THIS SYSTEM
- USED COMPONENT
- SYSTEM OPERATION
- CIRCUIT DESCRIPTION
- SYSTEM ALGORITHM
- PERFORMANCE METRICS FOR BIOMETRIC SYSTEMS
CHAPTER FOUR
TESTING AND RESULTS
- CONSTRUCTION PROCEDURE AND TESTING
- INSTALLATION OF THE COMPLET DESIGN
- ASSEMBLING OF SECTIONS
- ECONOMIC OF THE PROJECT
- PROJECT VIABILITY
- PROJECT RELIABILITY
- PROJECT MAINTAINABILITY
- PROJECT EVALUATION
CHAPTER FIVE
- CONCLUSION
- RECOMMENDATION
- REFERENCES
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
Biometrics consists of automated methods of recognizing a person based on unique physical characteristic. Each type of biometric system, while different in application, contains at least one similarity: the biometric must be based upon a distinguishable human attribute such as a person's fingerprint, iris, voice pattern or even facial pattern.
Today fingerprint devices are by far the most popular form of biometric security used, with a variety of systems on the market intended for general and mass market usage. Long gone are the huge bulky fingerprint scanners; now a fingerprint scanning device can be small enough to be incorporated into a laptop for security.
A fingerprint is made up of a pattern of ridges and furrows as well as characteristics that occur at Minutiae points (ridge bifurcation or a ridge ending).
Fingerprint scanning essentially provides an identification of a person based on the acquisition and recognition of those unique patterns and ridges in a fingerprint.
The actual fingerprint identification process will change slightly between products and systems. The basis of identification, however, is nearly the same. Standard systems are comprised of a sensor for scanning a fingerprint and a processor which stores the fingerprint database and software which compares and matches the fingerprint to the predefined database. Within the database, a fingerprint is usually matched to a reference number, or PIN number which is then matched to a person's name or account. In instances of security the match is generally used to allow or disallow access, but today this can also be used for something as simple as a time clock or payroll access.
In large government organizations and corporations, biometrics plays a huge role in employee identification and security. Additionally some data centers have jumped on the bandwagon and have implemented biometric scanners to enhances remote access and management by adding another layer of network security for system administrators. Unfortunately the cost of implementing fingerprint and other biometric security scanning in data centers is still quite expensive, and many centers still rely on ID badges while waiting until biometric technology becomes a little more pocket-book friendly.
Today companies have realized that fingerprint scanning is an effective means of security. While the cost of implementing biometric scanners in larger organizations and data centers is still quite costly, we did find several fingerprint scanning devices which would fit into the budget of many small offices and home users. These home and small office products are designed to protect your hard drive, notebook or even to remove the need for users to remember multiple passwords.
1.2 PROBLEM STATEMENT
Educational institutions still use attendance registers for managing student attendances. The teacher has to call out names during the lecture time. Increased number of students causes wastage of reasonable amount of time from the valuable lecture time. To save this time, some teachers follow the method of marking attendance by signing on a paper which is passed to the class during the lecture time. Here there is a chance of cheating by the students by putting signature of an absentee. This system was built to overcome these challenges.
1.3 AIM AND OBJECTIVE OF THE PROJECT
The objective of this work is to construct a device that utilizes fingerprint recognition technology to allow access. It contains all the necessary electronics to allow you to store, delete, and verify fingerprints with just the touch of a button. The objectives are:
- To overcome the manual processes involved in class attendance and examination attendance.
- To design a new system
- To ensure accuracy in attendance.
1.4 SIGNIFICANCE OF THE PROJECT
1. Biometric fingerprint is most secured system as compared to other systems. Reason is that RFID card or Keys of lock can be stolen, password may be leaked. However thumbnail of every human being is unique, so lock will not open unless the same person is present to give the impression of fingerprint.
2. No need to carry the keys to open the lock. Or even there is no need to remember the password or any Pin number.
3. One of the main advantages is that this system remembers the stored password even if the power supply is turned off.
4. Scientific research and studies have proved that fingerprints do not change as you grow up.
5. Using Fingerprint saves time to gain access as compared to other methods like RFID card, Password or Key.
6. Fingerprints are much harder to fake than identity cards.
7. You can't guess a fingerprint pattern like you can guess a password.
8. You can't misplace your fingerprint, like you can misplace an access card.
9. You can't forget your fingerprints like you can forget a password.
1.5 APPLICATIONS OF THE PROJECT
1. Industrial application: “Fingerprint based security system” project can be used by the employees, staff or workers in various industries like Automobile industries, manufacturing industries, Software development companies.
2. Home or domestic application: This project can be used to automate the door locking process at our home, so the user need not to carry the door lock keys along with him, he can just use his/her finger to open the door.
3. Bank Lockers or security safes: Many of the banks use key based or password based locks for their lockers or safes. We can implement Fingerprint based bank locker system using this project.
1.6 SCOPE OF THE PROJECT
Personal Safes are revolutionary locking storage cases that open with just the touch of your finger. These products are designed as secure storage for medications, jewelry, weapons, documents, and other valuable or potentially harmful items. These utilize fingerprint recognition technology to allow access to only those whose fingerprints you choose. It contains all the necessary electronics to allow you to store, delete, and verify fingerprints with just the touch of a button. Stored fingerprints are retained even in the event of complete power failure or battery drain. These eliminates the need for keeping track of keys or remembering a combination password, or PIN. It can only be opened when an authorized user is present, since there are no keys or combinations to be copied or stolen, or locks that can be picked.
1.7 LIMITATION OF THE PROJECT
Although fingerprint biometric technology has many benefits, it also have some limiting factors.
- First, these devices capture not only an image of the finger, but also a picture of the dirt, greases, and contamination found on the finger. Therefore, in certain areas, there are chances of being rejected by the system if for example a worker has a mark or some other contaminants on his finger.
- Secondly, today's scanners still cannot recognize if the fingerprint is on a real finger or an artificial one, therefore, it is possible to trick the scanner by using a gelating print mold over a real finger.
- A third disadvantage of these devices is the extent of the damage when somebody does manage to steal the identity information. Thus, if someone's fingerprint data is compromised, it may not only compromise network security but also their bank account, car, etc. Moreover, even though these devices work well with an enrolled database, it may not be the case if used in a national database for the airline industry. It would require the whole industry to have the same technology to enroll their employees and submit the enrollment into a common database. The more the enrollment database grew, the more the opportunity for duplications and errors will increase.
- Finally, there are also some ethical issues associated with the use of biometric technology. In fact, people tend to associate these devices to criminal proceedings and therefore are reluctant to having their fingers scanned.
1.8 OPERATIONAL DEFINITION OF TERMS
- Biometrics is physiological or behavioral characteristics unique to individuals, this Include Fingerprint, hand geometry, handwriting, iris, retinal, vein and voice.
- PIN personal identification number.
- Biometric Verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits.
- Scanner a device for examining, reading, or monitoring something in particular.
- Fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern.
- Rapid Application Development is a concept that products can be developed faster and of higher quality.
- Authentication is the process of determining whether someone or something is, in fact, who or what it declared to be.
- Use Case Diagram is used to show scenarios used for understanding the requirements of the system and to show the interaction between the user and the system.
- Flow chart or Activity Diagram is a Unified Modeling Language that represents the graphical workflows of stepwise activities and actions with support for iteration, choice and concurrency
CHAPTER TWO
2.0 LITERATURE REVIEW
2.1 OVERVIEW OF BIOMETRICS
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioral characteristics. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics to describe the latter class of biometrics.
CHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of "design and construction of a fingerprint authentication system" is also available. Order full work to download. Chapter two of "design and construction of a fingerprint authentication system" consists of the literature review. In this chapter all the related works on "design and construction of a fingerprint authentication system" were reviewed.
CHAPTER THREE: The complete chapter three of "design and construction of a fingerprint authentication system" is available. Order full work to download. Chapter three of "design and construction of a fingerprint authentication system" consists of the methodology. In this chapter all the method used in carrying out this work was discussed.
CHAPTER FOUR: The complete chapter four of "design and construction of a fingerprint authentication system" is available. Order full work to download. Chapter four of "design and construction of a fingerprint authentication system" consists of all the test conducted during the work and the result gotten after the whole work
CHAPTER FIVE: The complete chapter five of design and construction of a "design and construction of a fingerprint authentication system" is available. Order full work to download. Chapter five of "design and construction of a fingerprint authentication system" consist of conclusion, recommendation and references.
To "DOWNLOAD" the complete material on this particular topic above click "HERE"
Do you want our Bank Accounts? please click HERE
To view other related topics click HERE
To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE
Do you want us to research your new topic? if yes, click "HERE"
Do you have any question concerning our post/services? click HERE for answers to your questions
For more information contact us through any of the following means:
Mobile No :+2348146561114 or +2347015391124 [Mr. Innocent]
Email address :engr4project@gmail.com
COUNTRIES THAT FOUND OUR SERVICES USEFUL
Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124
Watsapp No :+2348146561114
Email Address :engr4project@gmail.com
FOLLOW / VISIT US VIA: