VIEWS: 167 PAGES: 14 CATEGORY: Engineering POSTED ON: 9/7/2010
The general trend of human nature always longing for security Physically, Mentally and Socially. Fingerprint based security access control and time attendance systems are used for all kinds of office and service sector operations in the day today environment. Fingerprint System based access control is more secured as compared to the conventional swipe card or ID cards because of the exclusive fingerprint for every entity.
Engr.Naveed Akhtar FINGER PRINT SECURITY University College Of Engineering IUB Page 1 Engr.Naveed Akhtar INTRODUCTION-: The general trend of human nature always longing for security Physically, Mentally and Socially. Fingerprint based security access control and time attendance systems are used for all kinds of office and service sector operations in the day today environment. Fingerprint System based access control is more secured as compared to the conventional swipe card or ID cards because of the exclusive fingerprint for every entity. Fingerprint Security Systems have fascinated people for centuries. They have been used as a method of personal identification since ancient times. The two key aspects of most of the Fingerprint System biometric solutions are Finger Print identification and authentication. University College Of Engineering IUB Page 2 Engr.Naveed Akhtar The process of identification tells you who an individual is, or in the negative sense tells you who they are not. Fingerprints Security is examined using two different sets of criteria. One way of looking at Fingerprint Security System is using their "Class Characteristics". Finger Print Security Systems can be used to get rid of so many issues such as Physical Access Control, Health care Biometrics, Fingerprint and Biometrics Locks, Biometric Sensors and Detectors, RFID Tags, RFID Readers, Road Barriers, RFID Smart Card, CCTV, Metal Detectors, LED Search Lights, Fire Alarm, Finger Print Movement Control, Physical Access Control, Optical Fingerprint Scanners, Optical Sensors, Card Locks, Card Access Control Systems, Fingerprint Technology, Digital Fingerprint, USB Fingerprint Reader etc. Fingerprint System Authentication is a simpler process. It involves affirming or rejecting a claimed identity by matching a live template University College Of Engineering IUB Page 3 Engr.Naveed Akhtar with an existing one. Most of these identification/ authentications are done by using Smart Card. The large growth of ID - Card based Fingerprint system security is wildly used in Public service applications. These cards are used for multiple purpose applications such as Digital parking meters, telephone, vending machines, ATM Cards, Digital Fingerprint Security System Identity, Personal Identification Verification Number etc. Another kind of Fingerprint System is the scanner using ultrasound. The process involves high frequency sound to identify a fingerprint. An advantage of ultrasound sensors is that they are not affected by external hindrances like dirt on a finger. Thermal Fingerprint Security System Scanners work by measuring temperature differences used for a variety of security and data-collection purposes, from identifying prisoners to allowing access to information or high-security areas. University College Of Engineering IUB Page 4 Engr.Naveed Akhtar University College Of Engineering IUB Page 5 Engr.Naveed Akhtar A BRIEF INTRODUCTION TO 8051 MICROCONTROLLER-: When we have to learn about a new computer we have to familiarize about the machine capability we are using, and we can do it by studying the internal hardware design (devices architecture), and also to know about the size, number and the size of the registers. A microcontroller is a single chip that contains the processor (the CPU), non-volatile memory for the program (ROM or flash), volatile memory for input and output (RAM), a clock and an I/O control unit. Also called a "computer on a chip," billions of microcontroller units (MCUs) are embedded each year in a myriad of products from toys to appliances to automobiles. For example, a single vehicle can use 70 or more microcontrollers. The following picture describes a general block diagram of microcontroller. AT89S52: The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8K bytes of in-system programmable Flash memory. The device is manufactured using Atmel’s high-density nonvolatile memory technology and is compatible with the industry- standard 80C51 instruction set and pinout. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory pro-grammer. By combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller, which provides a highly flexible and cost-effective solution to many, embedded control applications. University College Of Engineering IUB Page 6 Engr.Naveed Akhtar The AT89S52 provides the following standard features: 8K bytes of Flash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit timer/counters, a six-vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. The Power-down mode saves the RAM con-tents but freezes the oscillator, disabling all other chip functions until the next interrupt University College Of Engineering IUB Page 7 Engr.Naveed Akhtar The hardware is driven by a set of program instructions, or software. Once familiar with hardware and software, the user can then apply the microcontroller to the problems easily. The pin diagram of the 8051 shows all of the input/output pins unique to microcontrollers: University College Of Engineering IUB Page 8 Engr.Naveed Akhtar The following are some of the capabilities of 8051 microcontroller. Internal ROM and RAM I/O ports with programmable pins Timers and counters Serial data communication The 8051 architecture consists of these specific features: 16 bit PC &data pointer (DPTR) 8 bit program status word (PSW) 8 bit stack pointer (SP) Internal ROM 4k Internal RAM of 128 bytes. University College Of Engineering IUB Page 9 Engr.Naveed Akhtar 4 register banks, each containing 8 registers 80 bits of general purpose data memory 32 input/output pins arranged as four 8 bit ports: P0-P3 Two 16 bit timer/counters: T0-T1 Two external and three internal interrupt sources Oscillator and clock circuits. University College Of Engineering IUB Page 10 Engr.Naveed Akhtar BLOCKDIAGRAM OF FINGER PRINT SECURITY-: University College Of Engineering IUB Page 11 Engr.Naveed Akhtar Algorithms-: Matching algorithms are used to compare previously stored templates of fingerprints against candidate fingerprints for authentication purposes. In order to do this either the original image must be directly compared with the candidate image or certain features must be compared. Pattern-based (or image-based) algorithms-: Pattern based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint. This requires that the images be aligned in the same orientation. To do this, the algorithm finds a central point in the fingerprint image and centers on that. In a pattern-based algorithm, the template contains the type, size, and orientation of patterns within the aligned fingerprint image. The candidate fingerprint image is graphically compared with the template to determine the degree to which they match. University College Of Engineering IUB Page 12 Engr.Naveed Akhtar CONCLUSION-: Fingerprint biometrics are used in a variety of applications including electronic door locks, smart cards, vehicle ignition control systems, USB sticks with fingerprint controlled access, and many others. Digital signal processing elements in fingerprint scanners perform complex DSP functions such as filters, transforms, feature extraction, matching operations and other algorithms. University College Of Engineering IUB Page 13 Engr.Naveed Akhtar University College Of Engineering IUB Page 14
Pages to are hidden for
"FINGER PRINT SECURITY"Please download to view full document