A number of biometric characteristics have been in use for different applications. Each biometric trait has its strengths and weaknesses, and the choice depends on the application. No single biometric is expected to effectively meet all of the requirements. So we chose three biometric traits for effective result.
The database will store all the three biometric of a single person as a cluster. We only consider retrieving information when all the biometric matches, if any one of them doesn’t match then the information cannot be retrieved. Each biometric is compared with the database. And the information is retrieved by the authorized person successfully.
google ads
Tuesday, August 4, 2009
4 Signature verification module:
The way a person signs his or her name is known to be a characteristic of that individual. Signatures are a behavioral biometric that change over a period of time and are influenced by physical and emotional conditions of the signatories.
The signature image is gray scaled and the pixel value will be evaluated. The boundary of the signature is extracted with feature of the signature image. The feature of an image are length, centroid, six fold, etc are extracted. Then the signature image is verified, compared and identified with that of the image stored in the database.
The signature image is gray scaled and the pixel value will be evaluated. The boundary of the signature is extracted with feature of the signature image. The feature of an image are length, centroid, six fold, etc are extracted. Then the signature image is verified, compared and identified with that of the image stored in the database.
.3 Iris recognition module:
This is our second biometric traits where we will take iris as our physical trait for recognizing the authorized user. The iris is the annular region of the eye bounded by the pupil and the sclera (white of the eye) on either side. Each iris is believed to be distinctive and, like fingerprints, even the irises of identical twins are expected to be different. It is extremely difficult to surgically tamper the texture of the iris.
The image of the iris will be Gray scaled and the gray scaled image will be processed with a process called smoothing. The edge of the iris image will be retrieved and that image will be compared with the image stored in the database.
The image of the iris will be Gray scaled and the gray scaled image will be processed with a process called smoothing. The edge of the iris image will be retrieved and that image will be compared with the image stored in the database.
2 Finger print warping module:
We consider finger print as one of the biometric traits in our project. Finger print can be warped or distorted by following some procedure. All the biometric traits will be stored in the database for future comparison. The finger print can be compared with the finger print image stored in the database.
This comparison is done by gray scaling the image and obtaining the skeletonized image. The skeletonized image will retrieve the ridges and valley of a fingerprint image. Then the fingerprint image will be compared using the ridge curve correspondence method.
This comparison is done by gray scaling the image and obtaining the skeletonized image. The skeletonized image will retrieve the ridges and valley of a fingerprint image. Then the fingerprint image will be compared using the ridge curve correspondence method.
1. Authentication module
The first module of this project is authentication. Authentication is done to secure the project from unauthorized user. The username and password is checked and the unauthorized user is ignored. The user can access the application if the username and password is valid. As it is the first module of the project it gives security to our application.
USER INTERFACE REQUIREMENTS
“Biometrics: A tool for information security” involves the following modules. The total project is classified into five modules. These modules can fully functions the process of retrieving information with authentication.
1. Authentication module
2. Finger print warping module
3. Iris recognition module
4. Signature verification module
5. Finding match module
1. Authentication module
2. Finger print warping module
3. Iris recognition module
4. Signature verification module
5. Finding match module
Subscribe to:
Comments (Atom)