DESIGN AND CONSTRUCTION OF A FINGERPRINT BIOMETRIC
We are in an era of greater security risk and increasing regulation, more organizations are implementing strong authentication to protect their data and meet regulatory compliance demands. Of the broad variety of strong authentication device options, fingerprint biometrics provides strong authentication and user convenience. Fingerprint biometrics are highly reliable because they cannot be easily faked, altered or misappropriated.
Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric data are separate and distinct from personal information. Biometric templates cannot be reverse-engineered to recreate personal information and they cannot be stolen and used to access personal information. This project is based on biometric using fingerprint.
CHAPTER ONE
1.1 INTRODUCTION
Biometrics consists of automated methods of recognizing a person based on unique physical characteristic. Each type of biometric system, while different in application, contains at least one similarity: the biometric must be based upon a distinguishable human attribute such as a person's fingerprint, iris, voice pattern or even facial pattern.
Today fingerprint devices are by far the most popular form of biometric security used, with a variety of systems on the market intended for general and mass market usage. Long gone are the huge bulky fingerprint scanners; now a fingerprint scanning device can be small enough to be incorporated into a laptop for security.
A fingerprint is made up of a pattern of ridges and furrows as well as characteristics that occur at Minutiae points (ridge bifurcation or a ridge ending).
Fingerprint scanning essentially provides an identification of a person based on the acquisition and recognition of those unique patterns and ridges in a fingerprint.
The actual fingerprint identification process will change slightly between products and systems. The basis of identification, however, is nearly the same. Standard systems are comprised of a sensor for scanning a fingerprint and a processor which stores the fingerprint database and software which compares and matches the fingerprint to the predefined database. Within the database, a fingerprint is usually matched to a reference number, or PIN number which is then matched to a person's name or account. In instances of security the match is generally used to allow or disallow access, but today this can also be used for something as simple as a time clock or payroll access.
In large government organizations and corporations, biometrics plays a huge role in employee identification and security. Additionally some data centers have jumped on the bandwagon and have implemented biometric scanners to enhances remote access and management by adding another layer of network security for system administrators. Unfortunately the cost of implementing fingerprint and other biometric security scanning in data centers is still quite expensive, and many centers still rely on ID badges while waiting until biometric technology becomes a little more pocket-book friendly.
Today companies have realized that fingerprint scanning is an effective means of security. While the cost of implementing biometric scanners in larger organizations and data centers is still quite costly, we did find several fingerprint scanning devices which would fit into the budget of many small offices and home users. These home and small office products are designed to protect your hard drive, notebook or even to remove the need for users to remember multiple passwords.
1.2 OBJECTIVE OF THE PROJECT
The objective of this work is to construct a device that utilizes fingerprint recognition technology to allow access. It contains all the necessary electronics to allow you to store, delete, and verify fingerprints with just the touch of a button.
1.3 SIGNIFICANCE OF THE PROJECT
1. Biometric fingerprint is most secured system as compared to other systems. Reason is that RFID card or Keys of lock can be stolen, password may be leaked. However thumbnail of every human being is unique, so lock will not open unless the same person is present to give the impression of fingerprint.
2. No need to carry the keys to open the lock. Or even there is no need to remember the password or any Pin number.
3. One of the main advantages is that this system remembers the stored password even if the power supply is turned off.
4. Scientific research and studies have proved that fingerprints do not change as you grow up.
5. Using Fingerprint saves time to gain access as compared to other methods like RFID card, Password or Key.
6. Fingerprints are much harder to fake than identity cards.
7. You can't guess a fingerprint pattern like you can guess a password.
8. You can't misplace your fingerprint, like you can misplace an access card.
9. You can't forget your fingerprints like you can forget a password.
1.4 APPLICATIONS OF THE PROJECT
1. Industrial application: “Fingerprint based security system” project can be used by the employees, staff or workers in various industries like Automobile industries, manufacturing industries, Software development companies.
2. Home or domestic application: This project can be used to automate the door locking process at our home, so the user need not to carry the door lock keys along with him, he can just use his/her finger to open the door.
3. Bank Lockers or security safes: Many of the banks use key based or password based locks for their lockers or safes. We can implement Fingerprint based bank locker system using this project.
1.5 SCOPE OF THE PROJECT
Personal Safes are revolutionary locking storage cases that open with just the touch of your finger. These products are designed as secure storage for medications, jewelry, weapons, documents, and other valuable or potentially harmful items. These utilize fingerprint recognition technology to allow access to only those whose fingerprints you choose. It contains all the necessary electronics to allow you to store, delete, and verify fingerprints with just the touch of a button. Stored fingerprints are retained even in the event of complete power failure or battery drain. These eliminates the need for keeping track of keys or remembering a combination password, or PIN. It can only be opened when an authorized user is present, since there are no keys or combinations to be copied or stolen, or locks that can be picked.
1.7 LIMITATION OF THE PROJECT
Although fingerprint biometric technology has many benefits, it also have some limiting factors.
- First, these devices capture not only an image of the finger, but also a picture of the dirt, greases, and contamination found on the finger. Therefore, in certain areas, there are chances of being rejected by the system if for example a worker has a mark or some other contaminants on his finger.
- Secondly, today's scanners still can not recognize if the fingerprint is on a real finger or an artificial one, therefore, it is possible to trick the scanner by using a gelating print mold over a real finger.
- A third disadvantage of these devices is the extent of the damage when somebody does manage to steal the identity information.Thus, if someone's fingerprint data is compromised, it may not only compromise network security but also their bank account, car, etc.Moreover, even though these devices work well with an enrolled database, it may not be the case if used in a national database for the airline industry. It would require the whole industry to have the same technology to enroll their employees and submit the enrollment into a common database. The more the enrollment database grew, the more the opportunity for duplications and errors will increase.
- Finally, there are also some ethical issues associated with the use of biometric technology. In fact, people tend to associate these devices to criminal proceedings and therefore are reluctant to having their fingers scanned.
1.7 PROJECT WORK ORGANISATION
The various stages involved in the development of this project have been properly put into five chapters to enhance comprehensive and concise reading. In this project thesis, the project is organized sequentially as follows:
Chapter one of this work is on the introduction to a biometric finger print. In this chapter, the background, significance, objective limitation and problem of a biometric finger print were discussed.
Chapter two is on literature review of a biometric finger print. In this chapter, all the literature pertaining to this work was reviewed.
Chapter three is on design methodology. In this chapter all the method involved during the design and construction were discussed.
Chapter four is on testing analysis. All testing that result accurate functionality was analyzed.
Chapter five is on conclusion, recommendation and references.
This material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We make abstract and chapter one visible for everyone.
All Project Topics on this site have complete 5(five) Chapters . Each Project Material include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.
To "DOWNLOAD" the complete material on this particular topic above click "HERE"
Do you want our Bank Accounts? please click HERE
To view other related topics click HERE
To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE
Do you want us to research for your new topic? if yes, click "HERE"
Do you have any question concerning our post/services? click HERE for answers to your questions
You can also visit our facebook Page at fb.me/hyclas to view more our related construction (or design) pics
For more information contact us through Any of the following means:
Mobile No :+2348146561114 or +2347015391124 [Mr. Innocent]
Email address :engr4project@gmail.com
Watsapp No :+2348146561114
To View Our Design Pix: You can also visit our facebook Page at fb.me/hyclas for our design photos/pics.
IF YOU ARE SATISFIED WITH OUR SERVICES, PLEASE DO NOT FORGET TO INVITE YOUR FRIENDS AND COURSEMATES TO OUR PAGE.