Documente Academic
Documente Profesional
Documente Cultură
Synopsis
Submitted by:
Group No: < >
SBIT ii
<Finger Print Recognition> Synopsis
Faculty Comments
Name of Faculty :
Signature of Faculty :
Date of Checking :
If the synopsis is rejected faculty will mention the reason below and group is required to
submit the new synopsis by the date mentioned above.
Comments :__________________________________________________
_______________________________________________________________________
_______________________________________________________________________
SBIT iii
TABLE OF CONTENTS
2 PROCESS DESCRIPTION...................................................................................................................2
4 CONCLUSION.......................................................................................................................................4
<Finger Print Recognition> Synopsis
Fingerprints are graphical flow-like ridges present on human fingers. They are fully
formed at about seven months of fetus development and finger ridge configurations do not
change throughout the life of an individual except due to accidents such as bruises and cuts on
the fingertips. This property makes fingerprints a very attractive biometric identifier. Fingerprint
system can be separated into two categories Verification and identification.
SBIT 1
<Finger Print Recognition> Synopsis
2 Process Description
A finger print system works in two modes they are Enrollment mode and Authentication
mode. Enrollment mode: fingerprint system is used to identify and collect the related
information about the person and his/her fingerprint image. Authentication mode: fingerprint
system is used to identify the person who is declared to be him/her.
SBIT 2
<Finger Print Recognition> Synopsis
An overview of fully realized user identification functionality on an electronic device can be viewed as
containing the following subsystems : (1) fingerprint sensor hardware, (2) a computational platform
host, (3) biometric software, (4) system application software, and (5) user application software. These
components are illustrated in the form of a architecture.
The fingerprint detector detects the presence of a finger and converts the pattern into an electrical form
that can be used by subsequent information processing stages. The biometric authentication services
software manages and optimizes the sensor hardware, optimizes the fingerprint image, performs feature
extraction and matching and makes decisions to accept or reject the identity. It is this layer that typically
involves the heaviest computational workloads.
SBIT 3
<Finger Print Recognition> Synopsis
The system application software is the link between the biometric identification system and the host
device resources and operating systems. It provides host specific user interface and user control functions
to the biometric ID system. It also allow biometric identification to be used to gain access to basic system
resources. It performs functions like user login, applications and data protection and browser password
replacement.
• Activates the sensor and detects the finger placed on the sensor.
• Collects images from the sensor and manages the user interaction from the sensor.
• Optimizes the images using various approaches
• Estimates the probability that the live images come from the same user as previously image
stored data.
• Determines if the data stored offers sufficient match confidence to declare a verified user
identity.
4 Conclusion
By this project, we have represented the most promising technique for user authentication into any
system securely. This technique now can be implemented using compute power that is presently
available on modern DSPs (Digital Signal Processing). The use of such technology is dependent on our
ability to integrate it into a system into a user friendly and most efficient manner.
SBIT 4