Biometric Authentication
Biometric Authentication
PRESENTED BY :-
AMAN KUMAR (BE/6014/15)
ANKIT SINGH (BE/6045/15)
Under the guidance of Prof. Aakash Kumar Gupta
OBJECTIVE
• The aim of this project is to contribute a comprehensive study
of the new biometrics techniques such as fingerprint, face
recognition, retina, palm print, voice biometrics.
• The working of fingerprint based biometric attendance system
using arduino .
Digital Certificates
Digital signatures
Data Encryption
BIOMETRIC TECHNIQUE
Fingerprint biometrics :
It is digitized, automated version of the ancient ink-and paper system used for
identification by law enforcement agencies. It is distinguishable and immovable .
Classification:
• Minutiae – based- approach
• Correlation based approach
• Pattern based/ image based matching.
Face recognition :
Facial recognition is a biometric software application capable of uniquely
identifying or verifying a person by comparing and analysing patterns based on
the person's facial contours.
Following ways :
• Facial metric
• Eigen faces
• Skin texture analysis
Retina Biometrics
The Retinal scan biometric is based on the distinctive patterns on a person’s
retina, which is significantly different from the iris recognition. It is older than
the Iris scanning which also uses the part of the eye.
Palm Print
In this project, we used fingerprint Module and Arduino to take and keep attendance data
and records. By using fingerprint sensor, the system will become more secure for the users.
Required Components
Arduino -1
Finger print module -1
Push Button - 4
LEDs -1
1K Resistor -2
2.2K resistor -1
Power
Connecting wires
Box
Buzzer -1
16x2 LCD -1
Bread Board -1
RTC Module -1
WORKING OF FINGERPRINT BASED ATTENDENCE SYSTEM
Biometric Identification – Advantages
• Biometric identification can provide extremely accurate, secured access to
information; fingerprints, retinal and iris scans produce absolutely unique data
sets when done properly.
• Current methods like password verification have many problems (people write
them down, they forget them, they make up easy-to-hack passwords).
• Automated biometric identification can be done very rapidly and uniformly, with
a minimum of training your identity can be verified without resort to documents
that may be stolen, lost or altered.
Conclusions
• Biometrics is more secured when compared to conventional methods of
authorization
• In real time and in near future, the identification of users with very high
degree of confidence is required for the automated systems
References
• Anil K. Jain, Karthik Nandakumar and Arun Ross, “50 years of
biometric research, Accomplishments, Challenges and
Opportunities”, Pattern Recognition Letters, 2016, vol.79,
pp.80-105.