Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
INTRODUCTION
In an increasingly digital world, reliable personal
authentication has become an important human computer
interface activity. National security, ecommerce, and access to
computer networks are some examples where establishing a
persons identity is vital. Most existing security measures rely
on knowledge based approach like passwords or token based
approach such as swipe cards and passwords to control access
to physical and virtual spaces. However, all over the place, such
methods are not very secure. Token such as access cards may be
shared or stolen. Passwords and PIN numbers may be stolen
electronically. Further more, they cannot differentiate between
authorized user and a person having access to tokens or
knowledge. Biometrics such as fingerprint, face and voice print
offers reliable personal authentication that can address these
problems and is gaining citizen and government acceptance.
Among biometrics, fingerprint systems have been one of most
widely researched and deployed because of their easy access,
low price of fingerprint sensors, nonintrusive scanning, and
relatively good performance.There are a lot of attributes that
could be used for identification purposes. These attributes are
unique for each person. Of those attributes, the fingerprint was
the first one to be discovered and examined. Everyones finger
carries a unique pattern. This pattern consists of different loops,
spirals and curves and is absolutely unique.
Fingerprint-recognition-based IT security has reached great
importance as a mean of
Scope of project
Our project has scope in
SECURITY PURPOSE
Basically we are using neural networks & Hidden
Markov chain algorithms for fingerprint & Speech recognition
respectively using both of this algorithms the project aims at
identifying the authenticated person for security .Project aims
at giving 100% authentication using fingerprint impressions &
voice samples with less probability to fail in identification
using proposed algoriyhm.we would also try to implement the
same algorithms using iris and signature in future work.
1. SECURITY:
Biometric Identification Systems are widely used for
unique identification of humans
mainly for
verification and identification. Biometrics is used as a form
of identity access management and access control. So use
of biometrics in student attendance management system is
a secure approach. There are many types of biometric
systems like fingerprint recognition, face recognition,
voice recognition, iris recognition, palm recognition etc
Fingerscan provides an audit trail of the date and time a
user accessed the unit, the reason for access, and the result.
With a 0.0001% probability of a false acceptance fingerscan
2.Network security:
The biggest problem for network security is the
authentication system. For most systems, they mainly use and
rely on passwords which is a combination of letters, characters
and/or numbers. However, passwords need to be renewed
within a certain period of time to maintain a high level of
security. Moreover, it might be copied and used by
unauthorized users. To fix that problem,biometrics security
system can be applied. The most use of biometrics security
system in network is the logical access controlmethod. It will
verify person's identification for secure workstation logon or
network logon to get access control to the system.
LITERATURE SURVEY
1.Multimodal Biometrics &Authentication System
2.Fingerprint
Neural Network
Mr. Lokhande S.K., Prof. Mrs. Dhongde V.S.
authors says that The purpose of this project is to
design and develop a pattern recognition system with using
Artificial Neural Network (ANN) that can recognize the type
of image based on the features extracted from the choose
image[2]. Also comparing any two methods of neural
BLOCK DIAGRAM
FINGERPRINT SCANNER
Refers to automated method of
verifying match between human
fingerprints
One of the many forms to verify identity
MICROPHONE
Microphones take voice input from the
person and stores them in the database.
It converts speech signals into electrical
signals.
MAX232
Max232 is IC widely used in RS232 Communication systems
in which conversion of voltage
Level is required to make TTL devices to be compatible
with PC serial port and vice-versa.This chip contains charge
pumps which pumps the voltage to Desired level.It can be
powered by a single +5 volt power supply and its output can
reach +7.5 volts.MAX232 comes in 16 Pin Dip and many
other packages and it contains Dual Drivers.
MAX232 is compatible with RS-232 standard, and
consists of dual transceiver. Each receiver converts TIA/EIA232-E levels into 5V TTL/CMOS levels. Each driver converts
TTL/COMS levels into TIA/EIA-232-E levels. The MAX232
is characterized for operation from -40C to +85C for all
packages.MAX232 is purposed for application in highperformance information processing systems and control
devices of wide application. MAX232 is purposed for
PIC16F887
PORTS: A B C D E
D.C MOTOR
Electric drives
for
motor is used to
draw
electrical
energy
from the
mains and
supply the electrical energy to the motor at whatever voltage,
current and frequency necessary to achieve the desired
mechanical output.
Advantages of DC motor
Ease of control
Deliver high starting torque
Near-linear performance
Disadvantages:
High maintenance
Large and expensive (compared to induction motor)
Not suitable for high-speed operation due to commutator and
brushes
Not suitable in explosive or very clean environment
DC motor drives:
PIEZOBUZZER
POWER SUPPLY