0% found this document useful (0 votes)
7 views

A Secured Approach For Authentication System

The document describes a project that uses fingerprint and iris identification along with an RFID card to authenticate users. The system includes components like an RFID reader, fingerprint scanner, PC camera, microcontroller, and LCD display. It aims to prevent falsely claimed pensions by identifying users via their biometrics and RFID card. Fingerprint and iris data is captured and stored during enrollment and used to verify identity during authentication.

Uploaded by

Khadar Embedded
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

A Secured Approach For Authentication System

The document describes a project that uses fingerprint and iris identification along with an RFID card to authenticate users. The system includes components like an RFID reader, fingerprint scanner, PC camera, microcontroller, and LCD display. It aims to prevent falsely claimed pensions by identifying users via their biometrics and RFID card. Fingerprint and iris data is captured and stored during enrollment and used to verify identity during authentication.

Uploaded by

Khadar Embedded
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Embedded systems 7842522786/9948887244/9346934699

A Secured Approach for Authentication System


using Fingerprint and Iris
AIM
The main aim of this project is to prevent the phenomenon of the pension of falsely claim
through finger print and Iris identification.

PURPOSE
The purpose of this project is to use the fingerprint and Iris identification and IC card
combination to realize fingerprint authentication system collection.

BLOCK DIAGRAM

LCD

POWER
SUPPLY
PS

RFID
READER

KEYS

LPC2148
Micro

FINGER

controller

BUZZER

PRINT
MODULE
WEB
CAM

DC
MOTOR

PC

Email: [email protected]

www.purpletechnosolutions.com

9030880909/101/202/505/606

Embedded systems 7842522786/9948887244/9346934699

POWER SUPPLY

Step Down
Transformer

Bridge
Rectifier

Filter
Circuit

Regulator
section

DESCRIPTION
Due to human body features with no duplicate characteristics, people put eyes turned to
biometrics. Computer fingerprint identification automatic identification technology is the earliest
and the most practical and the mature technology among the identification technology.

Before starting the project initially the users will enroll their figure prints and eye images
that will be saved in the data base. In this project initially the user is made to show a RFID tag to
the reader. If it is invalid card it gives the error message display like invalid person again it
displays to show your RFID card. . If it is a valid one then the user have to enter the correct
password, if the user will entered the wrong password it will not moves the next step and the
buzzer will be on, if the password accessing is continuously failed for three times means then
process will move to the initial condition i.e. RFID tag showing step. If the user will entered the
correct password then controller asks for a fingerprint access. If the finger print accessing is
failed then buzzer will be on and the process will move to the first step i.e. RFID tag showing
step. If fingerprint access is matched with stored fingerprint or authorized person finger print
then controller asks for a Iris reorganization. i.e., the person who ever want access that particular
accessories or things first he/she has to place his eye in front of the PC camera at that time it will
Email: [email protected]

www.purpletechnosolutions.com

9030880909/101/202/505/606

Embedded systems 7842522786/9948887244/9346934699

capture the image of eye and for accessing of those accessories or things again taking the eye
image of same person and comparing with previous eye image in that same way we can access
some others with matching or compare of eye image and this whole process will done with the
help of matlab code. If it matches then he or she will access to that Particular accessories or thing
and the process goes on. If captured image does not matched with first taken image then the
controller gives a halt to the process and moves to the initial step RFID showing step.

TECHNOLOGY
RFID

RFID is an acronym for Radio Frequency Identification. In general terms, RFID is a means
of identifying a person or object using a radio frequency transmission. In other words RFID is an
electronic method of exchanging data over radio frequency waves. The technology can be used
to identify, track, sort or detect a wide variety of objects.
There are three major components of an RFID system: the reader, the antenna, and the tags. Each
tag is associated with a unique number. When a tag is in the detection range of the reader, the
number is read. Two types of tags can be found: active tags with a longer detection range and
passive tags with a shorter detection range. An RFID tag is usually attached to an object and the
information of the object along with the RFID number are recorded in the database. Whenever
the RFID tag is sensed, the object can thus be identified.
Microcontroller:
A Micro controller consists of a powerful CPU tightly coupled with memory RAM, ROM
or EPROM), various I / O features such as Serial ports, Parallel Ports, Timer/Counters, Interrupt
Controller, Data Acquisition interfaces-Analog to Digital Converter (ADC), Digital to Analog
Converter (ADC), everything integrated onto a single Silicon Chip.

Email: [email protected]

www.purpletechnosolutions.com

9030880909/101/202/505/606

Embedded systems 7842522786/9948887244/9346934699

It does not mean that any micro controller should have all the above said features on chip,
Depending on the need and area of application for which it is designed, The ON-CHIP features
present in it may or may not include all the individual section said above.
Any microcomputer system requires memory to store a sequence of instructions making
up a program, parallel port or serial port for communicating with an external system, timer /
counter for control purposes like generating time delays, Baud rate for the serial port, apart from
the controlling unit called the Central Processing Unit.
LCD Display Section:
This section is basically meant to show up the status of the project. This project makes
use of Liquid Crystal Display to display / prompt for necessary information.
RFID:
RFID is an acronym for Radio Frequency Identification. In general terms, RFID is a
means of identifying a person or object using a radio frequency transmission. In other words
RFID is an electronic method of exchanging data over radio frequency waves. The technology
can be used to identify, track, sort or detect a wide variety of objects.
There are three major components of an RFID system: the reader, the antenna, and the
tags. Each tag is associated with a unique number. When a tag is in the detection range of the
reader, the number is read. Two types of tags can be found: active tags with a longer detection
range and passive tags with a shorter detection range. An RFID tag is usually attached to an
object and the information of the object along with the RFID number are recorded in the
database. Whenever the RFID tag is sensed, the object can thus be identified.
Finger Print Scanner:
A fingerprint sensor is an electronic device used to capture a digital image of the
fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed
to create a biometric template (a collection of extracted features) which is stored and used for
matching.

Email: [email protected]

www.purpletechnosolutions.com

9030880909/101/202/505/606

Embedded systems 7842522786/9948887244/9346934699

It supports wide range of fingerprint sensor interoperability giving you a freedom to


select suitable sensor that most fits to your application. Furthermore, the fingerprint data for
enrollment and verification are compatible among different sensors, even if they are based on
different technologies. This feature of unification presents application manufacturers and system
integrators with much more flexibility than ever before.

Keys Section:
With the help of these keys the users can enroll their Finger prints and deleting their
figure prints.
PC Cam Section:
This section is basically meant to capture the IRIS of the persons and to transfer this
captured IRIS for Processing.
IRIS:
In this we are using the Iris recognition technique. Iris recognition analyzes the features
that exist in the colored tissue surrounding the pupil, which has 250 points used for comparison,
including rings, furrows, and freckles. Iris recognition uses a regular video camera system and
can be done from further away than a retinal scan. It has the ability to create an accurate enough
measurement that can be used for Identification purposes, not just verification.
The probability of finding two people with identical iris patterns is considered to be
approximately 1 in 1052(population of the earth is of the order 1010). Not even one-egged twins
or a future clone of a person will have the same iris patterns. The iris is considered to be an
internal organ because it is so well protected by the eyelid and the cornea from environmental
damage. It is stable over time even though the person ages. Iris recognition is the most precise
and fastest of the biometric authentication methods.
Buzzer: This is the output device which we are using to indicate the unauthorized person.

Email: [email protected]

www.purpletechnosolutions.com

9030880909/101/202/505/606

Embedded systems 7842522786/9948887244/9346934699

LOCKER SYSTEM: Here we are demonstrating a DC motor as the Locker for the authorized
persons in the Locker system mode.

SOFTWARE
1. Embedded C
2. Keil IDE
3. Uc-Flash
4. Matlab

HARDWARE
1. Micro Controller
2. RFID Reader
3. Fingerprint Module
4. Power supply
5. LCD
6. PC
7. IRIS scanner

ADVANTAGES OF THE PROJECT:

Security and management

High security in the bank transactions

Convenience

Easier fraud detection

Against to cards duplication, misplacement and improper disclosure of password

Requires physical presence of the person to be identified

Unique physical or behavioral characteristic

Cannot be borrowed, stolen, or forgotten

Email: [email protected]

www.purpletechnosolutions.com

9030880909/101/202/505/606

Embedded systems 7842522786/9948887244/9346934699

CONCLUSION:

A step by step approach in designing the id authentication system based on fingerprint


and iris identification giving security to the users banking system and providing the
security for the locker system using a finger print scanner and iris has been followed. The
result obtained in providing the security is quite reliable in all the three modes. The
system has successfully overcome some of the aspects existing with the present
technologies, by the use of finger print biometric and iris biometric as the authentication
technology.

RESULT
By using this project we can design and implementation of ID authentication system based on
Fingerprint and IRIS Identification.

Email: [email protected]

www.purpletechnosolutions.com

9030880909/101/202/505/606

You might also like