Detailed Design Specification Template

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Detailed Design Specification Template as PDF for free.

More details

  • Words: 942
  • Pages: 8
Synopsis

Date of Submission : <22nd September 2009>

Submitted by: Group No: < >

1. < Akanksha Tyagi >

<ECE/08/101 >

2. < Anuj Jain >

<ECE/08/160>

3. < Preeti Rana >

<ECE/08/133>

4. < Rahul Jain >

<ECE/08/138>

5. < Rahul Mehra >

<ECE/08/139>

6. < Yatish Tagra >

<ECE/08/157>

Synopsis

SBIT

ii

Synopsis

Faculty Comments

Name of Faculty

:

Signature of Faculty

:

Date of Checking

:

Status

:

Approved

Rejected

Date to submit new synopsis (applicable only if status is rejected) : If the synopsis is rejected faculty will mention the reason below and group is required to submit the new synopsis by the date mentioned above. Comments

:__________________________________________________

_______________________________________________________________________ _______________________________________________________________________

SBIT

iii

TABLE OF CONTENTS 1 OBJECTIVE AND SCOPE OF PROJECT.........................................................................................1 2 PROCESS DESCRIPTION...................................................................................................................2 3 RESOURCES AND LIMITATIONS....................................................................................................3 4 CONCLUSION.......................................................................................................................................4

Synopsis

1 Objective and Scope of Project The overall objective of the project is to develop a finger print system based on directional filter bank technique which works on minutiae. A point in the fingerprint image is designated as a minutia if it belongs to an ending, beginning or bifurcation of a ridge. The extraction of minutiae relies heavily on the quality of the input images.  S imple smoothing and sharpening Contrast stretching Dry and wet area detection Scope In order to aid forensics in criminal identification, authentication in civilian applications and for preventing unauthorized there is a need to develop a finger print recognition and analysis system. Fingerprint verification is an important biometric technique for personal identification. Biometrics are automated methods of recognizing an individual based on their physiological (e.g., fingerprints, face, retina, iris) or behavioral characteristics (e.g., gait, signature). Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. Each biometric has its strengths and weaknesses and the choice typically depends on the application. No single biometric is expected to effectively meet the requirements of all the applications. The match between a biometric and an application is determined depending upon the characteristics of the application and the properties of the biometric. Fingerprints are graphical flow-like ridges present on human fingers. They are fully formed at about seven months of fetus development and finger ridge configurations do not change throughout the life of an individual except due to accidents such as bruises and cuts on the fingertips. This property makes fingerprints a very attractive biometric identifier. Fingerprint system can be separated into two categories Verification and identification. Identification system recognizes an individual by searching the entire template database for a match. It conducts one-to-many comparisons to establish the identity of the individual. In an identification system, the system establishes a subject’s identity (or fails if the subject is not enrolled in the system database) without the subject having to claim an identity.

SBIT

1

Synopsis

2 Process Description Detailed Description of Fingerprint System The various steps involved in a typical fingerprint recognition system are shown below

Figure 1: Various steps in a Fingerprint system A finger print system works in two modes they are Enrollment mode and Authentication mode. Enrollment mode: fingerprint system is used to identify and collect the related information about the person and his/her fingerprint image. Authentication mode: fingerprint system is used to identify the person who is declared to be him/her.

Figure 2: Enrollment and Authentication stages of a fingerprint system

SBIT

2

Synopsis

Steps In The Design Process

Figure 3: Image Preprocessing and Feature Extraction

3 Resources and Limitations A prototype implementation of fingerprint recognition can be demonstrated by live real-time fingerprint authentication using a very small silicon fingerprint sensor(AuthenTec AES-4000) and a combination microcontroller with DSP development board. An overview of fully realized user identification functionality on an electronic device can be viewed as containing the following subsystems : (1) fingerprint sensor hardware, (2) a computational platform host, (3) biometric software, (4) system application software, and (5) user application software. These components are illustrated in the form of a architecture. The fingerprint detector detects the presence of a finger and converts the pattern into an electrical form that can be used by subsequent information processing stages. The biometric authentication services software manages and optimizes the sensor hardware, optimizes the fingerprint image, performs feature extraction and matching and makes decisions to accept or reject the identity. It is this layer that typically involves the heaviest computational workloads.

SBIT

3

Synopsis

The system application software is the link between the biometric identification system and the host device resources and operating systems. It provides host specific user interface and user control functions to the biometric ID system. It also allow biometric identification to be used to gain access to basic system resources. It performs functions like user login, applications and data protection and browser password replacement. • • • • •

Activates the sensor and detects the finger placed on the sensor. Collects images from the sensor and manages the user interaction from the sensor. Optimizes the images using various approaches Estimates the probability that the live images come from the same user as previously image stored data. Determines if the data stored offers sufficient match confidence to declare a verified user identity.

4 Conclusion By this project, we have represented the most promising technique for user authentication into any system securely. This technique now can be implemented using compute power that is presently available on modern DSPs (Digital Signal Processing). The use of such technology is dependent on our ability to integrate it into a system into a user friendly and most efficient manner.

SBIT

4

Related Documents