Ammad FYP

  • Upload
    ammad

  • View
    217

  • Download
    0

Embed Size (px)

Citation preview

  • 8/14/2019 Ammad FYP

    1/40

    FINGERPRINT RECOGNITION AND PASSWORD SECURITY

    SYSTEM

    PROJECT SUPERVISOR

    Dr. SYED WAQAR SHAH

    PROJECT LEADER

    AMMAD UDDIN

    MEMBERS

    AMEER ULLAH

    RUMMAN KHAN

    MUHAMMAD SHAKEEL

    1

  • 8/14/2019 Ammad FYP

    2/40

    INTRODUCTION

    1.1 The era of biometrics

    In the 21st century the use of biometric based systems have seen an

    exponential growth. This is all because of tremendous progress in this field

    making it possible to bring down their prices, easiness of use and its

    diversified use in every day life. Biometrics is becoming new state of art

    method of security systems. Biometrics are used to prevent unauthorized

    access to ATM, cellular phones , laptops , offices, cars and many othersecurity concerned things. Biometric have brought significant changes in

    security systems making them more secure then before, efficient and cheap.

    They have changed the security system from what you remember (such as

    password) or what you possess (such as car keys) to something you embody

    (retinal patterns, fingerprints, voice recognition).

    2

    INTRODUCTION

  • 8/14/2019 Ammad FYP

    3/40

    1.2 What is biometrics?

    Biometrics is the science of verifying the identity of an individual

    through physiological measurements or behavioral traits. Since biometric

    identifiers are associated permanently with the user they are more reliable

    than token or knowledge based authentication methods.

    1.3 Advantages of Biometrics

    Biometrics offers several advantages over traditional security

    measures. Some of them are presented below.

    1.3.1 Accuracy and Security

    Biometrics based security systems are far most secure and accuratethan traditional password or token based security systems. For example a

    password based security system has always the threat of being stolen and

    accessed by the unauthorized user. Further more the traditional security

    systems are always prone to accuracy as compared to biometrics which is

    more accurate.

    1.3.2 One individual, Multiple IDs

    Traditional security systems face the problem that they dont give

    solution to the problem of individuals having multiple IDs. For examples a

    person having multiple passports to enter a foreign country. Thanks to

    biometrics!!! They give us a system in which an individual cant possess

    multiple IDs and cant change his ID through out his life time. Each individual

    is identified through a unique Biometric identity throughout the world.

    1.3.3 One ID, multiple individuals

    In traditional security systems one ID can be used by multiple

    individuals. For example in case of a password based security system a

    single password can be shared among multiple individuals and they can

    share the resources allotted to a single individual. Biometric based securitysystem doesnt allow such a crime. Here each individual has a single unique

    ID and it cant be shared with any other individual.

    1.4 Biometrics categories

    Biometrics can be categorized in various categories as follow.

    3

  • 8/14/2019 Ammad FYP

    4/40

    1.4.1 Physical biometrics

    This biometrics involves measurement of physical characteristics of

    individuals. The most prominent of these include

    Fingerprints

    Face

    Hand geometry

    Iris scans

    Fingerprints

    Fingerprints recognition has been present for a few hundred years. Due

    to tremendous research this field has reached such a point where the

    purchase of fingerprint security system is quite affordable. For this reason

    these systems are becoming more widespread in a variety of applications.

    Fingerprint image.

    Face

    There has been significant achievement in face recognition system in

    past few years. Due to these advancements this problem appears to be

    eventually technologically feasible and economically realistic. In addition,

    4

  • 8/14/2019 Ammad FYP

    5/40

    current research involves developing more robust approaches that accounts

    for changes in lighting, expression, and aging, where potential variations for

    a given person are illustrated in Figure. Also, other problem areas being

    investigated include dealing with glasses, facial hair, and makeup.

    Facial Expression Image

    Hand geometry

    Hand geometry is one of the most basic biometrics in use today. A

    two-dimensional system can be implemented with a simple document

    scanner or digital camera, as these systems only measure the distances

    between various points on the hand. Meanwhile, a three dimensional system

    provides more information and greater reliability. These systems, however,

    require a more expensive collection device than the inexpensive scanners

    that can be used in a two-dimensional system. An example of a commercial

    three-dimensional scanner is shown in Figure.

    Commercial three-dimensional scanner

    As seen in this image, the physical size of the scanner limits its

    application in portable devices. The primary advantage of hand geometrysystems is that they are simple and inexpensive to use. Also, poor weather

    and individual anomalies such as dry skin or cuts along the hand do not

    appear to negatively affect the system. The geometry of the hand, however,

    is not a very distinctive quality. In addition, wearing jewelry or other items on

    the fingers may adversely affect the systems performance.

    5

  • 8/14/2019 Ammad FYP

    6/40

    Iris

    Iris recognition has taken on greater interest in recent years. As this

    technology advances, purchasing these systems has become more

    affordable. These systems are attractive because the pattern variability of

    the iris among different persons is extremely large. Thus, these systems canbe used on a larger scale with a small possibility of incorrectly matching an

    imposter. Also, the iris is well protected from the environment and remains

    stable over time. In terms of localizing the iris from a face, its distinct shape

    allows for precise and reliable isolation. Figure shows the unique iris pattern

    data extracted from a sample input.

    Iris pattern

    1.4.2 Behavioral biometrics

    This category of biometrics is temporal in nature. They are evolved

    during the life time of an individual. It involves measuring the way in which

    an individual performs certain tasks. Behavioral biometrics include

    Gait

    6

  • 8/14/2019 Ammad FYP

    7/40

    Handwriting

    Speech

    Signature

    Now let discuss some the behavioral biometrics in a little detail.

    Gait

    Gait-based recognition involves identifying a persons walking style.

    Although these systems are currently very limited, there is a significant

    amount of research being conducted in this area. Furthermore, studies have

    shown that gait changes over time and is also affected by clothes, footwear,

    walking surfaces, and other conditions. Figure below outlines the various

    stages of a gait cycle.

    Samples recorded from a gait cycle

    1.4.3 Chemical biometrics:

    This is a new emerging field. It involves measuring of chemical or

    biological composition of an individual different body parts such as

    DNA

    Blood glucose

    1.5 Multi-biometric systems

    Similar to multimodal systems, there are several other techniques

    aimed at improving the performance of a biometric system, as outlined in

    Figure below.

    1.5.1 Multimodal

    7

  • 8/14/2019 Ammad FYP

    8/40

    Multimodal systems employ more than one biometric recognition

    technique to arrive at a final decision. These systems may be necessary to

    ensure accurate performance. Combining several biometrics in one system

    allows for improved performance as each individual biometric has its own

    strengths and weaknesses. Using more than one biometric also provides

    more diversity in cases where it is not possible to obtain a particular

    characteristic for a person at a given time. Although acquiring more

    measurements increases the cost and computational requirements, the extra

    data allows for much greater performance.

    1.5.2 Multialgorithmic

    These techniques acquire a single sample from one sensor and process

    this signal with two or more different algorithms.

    1.5.3 Multi-instance

    These systems use a sensor to obtain data for different instances of

    the same biometric, such as capturing fingerprints from different fingers of

    the same person.

    1.5.4 Multi-sensorial

    8

  • 8/14/2019 Ammad FYP

    9/40

    These systems sample the same biometric trait with two or more

    different sensors, such as scanning a fingerprint using both optical and

    capacitance scanners.

    Multi-biometric categories

    9

    FINGERPRINT

    IENTIFICATION

    SYSTEM

  • 8/14/2019 Ammad FYP

    10/40

    Fingerprint Identification system

    2.1 A brief history

    Fingerprints have been scientifically studied for many years in our

    society. The characteristics of fingerprints were studied as early as 1600s.

    Meanwhile, using fingerprints as a means of identification first occurred in

    the mid-1800s. Sir William Herschel, in 1859, discovered that fingerprints do

    not change over time and that each pattern is unique to an individual. With

    these findings, he was the first to implement a system using fingerprints and

    handprints to identify an individual in 1877. By 1896, police forces in India

    realized the benefit of using fingerprints to identify criminals, and they began

    collecting the fingerprints of prisoners along with their other measurements.

    With a growing database of fingerprint images, it soon became

    desirable to have an efficient manner of classifying the various images.

    Between 1896 and 1897, Sir Edward Henry developed the Henry

    Classification System, which quickly found worldwide acceptance within a

    few years. This system allows for logical categorization of a complete set of

    the ten fingerprint images for a person. By establishing groupings based on

    fingerprint pattern types, the Henry System greatly reduces the effort of

    searching a large database. Until the mid-1990s, many organizations

    continued to use the Henry Classification System to store their physical files

    of fingerprint images.

    As fingerprints began to be utilized in more fields, the number of

    requests for fingerprint matching began to increase on a daily basis. At the

    same time, the size of the databases continued to expand with each passing

    day. Therefore, it soon became difficult for teams of fingerprint experts to

    provide accurate results in a timely manner. In the early 1960s, the FBI,

    Home Office in the United Kingdom, and Paris Police Department began to

    devote a large amount of resources in developing automatic fingerprint

    identification systems. These systems allowed for an improvement in

    10

  • 8/14/2019 Ammad FYP

    11/40

    operational productivity among law enforcement agencies. At the same time,

    the automated systems reduced funding requirements to hire and train

    human fingerprint experts. Today, automatic fingerprint recognition

    technology can be found in a wide range of civilian applications.

    2.2 Fingerprint details

    In this section structure and detail about fingerprint image will be

    explained. We will emphasize and give greater detail of only those

    terminologies which are related to our project.

    2.2.1 What is a fingerprint?

    A fingerprint is the feature pattern of ones finger as shown in figure

    below. It is believed with strong evidence that these feature patterns areunique for each individual. So each individual has its own fingerprint with

    permanent uniqueness. Thats why fingerprints have been used for

    identification and forensic investigation for a long time.

    A fingerprint image acquired by a sensor.

    2.2.3 Fingerprint features

    11

  • 8/14/2019 Ammad FYP

    12/40

    A fingerprint pattern is composed of a sequence of ridges and valleys.

    In a fingerprint image, the ridges appear as dark lines while the valleys are

    the light areas between the ridges. A cut or burn to a finger does not affect

    the underlying ridge structure, and the original pattern will be reproduced

    when new skin grows. Ridges and valleys generally run parallel to each

    other, and their patterns can be analyzed on a global and local level.

    Ridges and valleys generally run parallel to each other, and their

    patterns can be analyzed on a global and local level.

    2.2.4 Global level

    At the global level, the fingerprint image will have one or more regions

    where the ridge lines have a distinctive shape.

    2.2.5 Local level

    While the global level allows for a general classification of fingerprints,

    analyzing the image at the local level provides a significant amount of detail.

    These details are obtained by observing the locations where a ridge becomes

    discontinuous, known as minutiae points. Our project is also based on the

    minutiae based recognition.

    The most common types of minutiae are shown in Figure below.

    12

  • 8/14/2019 Ammad FYP

    13/40

    Ridge Types

    In general, a ridge can either come to an end, which is called a

    termination, or it can split into two ridges, which is called a bifurcation. The

    other types of minutiae are slightly more complicated combinations of

    terminations and bifurcations. For example, a lake is simply a sequence of

    two bifurcations in opposing directions, while an independent ridge features

    two separate terminations within a close distance. In our project we will use

    only the ridge ending and ridge bifurcation for identification.

    13

  • 8/14/2019 Ammad FYP

    14/40

    Minutiae Types (Terminations and Bifurcations)

    2.3 FINGERPRINT MATCHING TECHNIQUES

    Two main approaches are used for fingerprint matching which are

    described below.

    2.3.1 Minutiae based

    The first approach, which is minutia-based, represents the fingerprint

    by its local features, like terminations and bifurcations. This approach has

    been intensively studied, also is the backbone of the current available

    fingerprint recognition products. I am also using this approach in my project.

    2.3.2Image based

    The second approach, which uses image-based methods, tries to do

    matching based on the global features of a whole fingerprint image. It is an

    advanced and newly emerging method for fingerprint recognition. It is useful

    to solve some problems of the first approach. But my project does not aim at

    this method, so further study in this direction is not expanded in my thesis.

    14

  • 8/14/2019 Ammad FYP

    15/40

    15 SYSTEM DESIGN

  • 8/14/2019 Ammad FYP

    16/40

  • 8/14/2019 Ammad FYP

    17/40

    Figure. Project

    System Process flow Chart

    Each of these stages will now be explained in detail in the next

    chapter.

    17

    Post-processing

    False minutiaeremoval

    Minutiae Matching

  • 8/14/2019 Ammad FYP

    18/40

  • 8/14/2019 Ammad FYP

    19/40

    0

    00

    00

    00

    000

    500

    3000

    Histogram equalization is used to expand the pixels to all the intensity

    values from 0 to 255. Some of the original images are very dark i.e. their

    histogram is such that their intensity values are concentrated towards the

    origin i.e. near zero intensity value. On the other hand some of the images

    are very bright i.e. their intensity values are concentrated towards 255 and

    nearby intensity values. After applying the histogram equalization the pixels

    are distributed uniformly all over the intensity values from 0 to 255. Due to

    this process the contrast of the image is increased and so the visual effect of

    the image is increased.

    0

    200

    400

    600

    800

    1000

    1200

    1400

    1600

    1800

    2000

    0 50 100 150 200 250 Histogram of image before enhancement.

    19

  • 8/14/2019 Ammad FYP

    20/40

    Histogram of image after enhancement.

    Fingerprint image

    Before Histogram Equalization

    Fingerprint image

    After Histogram Equalization

    4.2 Fingerprint Image Binarization

    Fingerprint Image Binarization is to transform the 8-bit Gray fingerprint

    image to a 1-bit image with 0-value for ridges and 1-value for furrows. After

    20

  • 8/14/2019 Ammad FYP

    21/40

    the operation, ridges in the fingerprint are highlighted with black color while

    furrows are white.

    First a threshold value from the image is selected using matlab

    function graythresh. A threshold intensity value between 0 and 1 is

    obtained using the above function. This value is then used to convert thegrey image to a black and white image. The value of pixel which is less then

    the above threshold value calculated is taken as 0 representing the ridge in

    black color. A value of the pixel in the image which is greater than the

    threshold value calculated is then converted to 1 representing the white

    color valley or furrow. The following image shows the image before and after

    Binarization

    Fingerprint

    image before

    Binarization.

    Figure.Fingerprint

    image after

    Binarization

    21

  • 8/14/2019 Ammad FYP

    22/40

    Fingerprint image segmentation

    In general, only a Region of Interest (ROI) is useful to be recognized for

    each fingerprint image. The image area without effective ridges and furrows

    is first discarded since it only holds background information. Then the bound

    of the remaining effective area is sketched out since the minutia in the

    bound region is confusing with that spurious minutia that is generated when

    the ridges are out of the sensor.

    4.3 ROI by morphological operations

    Two Morphological operations called OPEN and CLOSE are adopted.

    The OPEN operation can expand images and remove peaks introduced by

    background noise. The CLOSE operation can shrink images and eliminate

    small cavities.

    4.4 Fingerprint Ridge Thinning

    Ridge Thinning is to eliminate the redundant pixels of ridges till the

    ridges are just one pixel wide. For this purpose I have used matlab built in

    function bwmorph. This function repeats operation on the ridges until they

    are one pixel wide and are suitable for minutiae extraction phase.

    22

  • 8/14/2019 Ammad FYP

    23/40

    5.1 Minutia Marking

    After the fingerprint ridge thinning, marking minutia points is relatively

    easy. In general, for each 3x3 window, if the central pixel is 1 and has exactly

    23

    MINUTIAE MATCHING

  • 8/14/2019 Ammad FYP

    24/40

    3 one-value neighbors, then the central pixel is a ridge branch as shown in

    figure. If the central pixel is 1 and has only 1 one-value neighbor, then the

    central pixel is a ridge ending shown in figure below.

    Bifurcation Termination

    Also the average inter-ridge width D is estimated at this stage. The

    average inter-ridge width refers to the average distance between two

    neighboring ridges. The way to approximate the D value is simple. Scan a

    row of the thinned ridge image and sum up all pixels in the row whose value

    is one. Then divide the row length with the above summation to get an inter-

    ridge width. For more accuracy, such kind of row scan is performed upon

    several other rows and column scans are also conducted, finally all the inter-

    ridge widths are averaged to get the D.

    5.2 Post processing

    Post processing mainly involves removal of the false minutiae from the

    fingerprint image.

    As described earlier, the crossing number algorithm is used again to

    locate the terminations and bifurcations within the final thinned image. In

    this process, the locations where the ridges end at the outer boundaries of

    the image are classified as terminations. In the true sense, however, these

    locations are not unique termination minutiae. Instead, they only appear as

    terminations because the dimensions of the image force each ridge to come

    to an end. Knowing this, these locations should not be recorded as minutiae

    within the fingerprint. One way to eliminate such locations involves creating

    an ellipse to only select minutiae points inside the fingerprint image.

    24

    101

    010010

    100

    010000

  • 8/14/2019 Ammad FYP

    25/40

    The center of the ellipse is established by locating the minimum and

    maximum rows and columns that contain a ridge pixel, then calculating the

    row and column that lie halfway between these extremes.

    5.3 Minutiae Matching

    The matching process involves comparing one set of minutiae data to

    another set. In most cases, this process compares an input data set to a

    previously stored data set with a known identity, referred to as a template.

    The template is created during the enrollment process, when a user presents

    a finger for the system to collect the data from. This information is then

    stored as the defining characteristics for that particular user.

    In our project since the whole process is done in matlab so there is no

    need for database creation. We need to compare only two images. If both the

    images are from the same fingerprint they are matched otherwise they are

    unmatched. The following are the steps involved in the matching process.

    1. First of all the two fingerprints which are to be matched are

    load into the matching function.

    2. Minutiae points i.e ridge ending and ridge bifurcation

    extracted from both fingerprint images are laoded into the

    function.

    3. A built in matlab function isequal is used to compare the

    two minutiae points i.e ridge ending and ridge bifurcation of

    both the images with each other.4. If both the ridge endings and ridge bifurcations of the two

    fingerprint images matches with each other, only then the

    fingerprint images are matched otherwise they are

    unmatched.

    25

  • 8/14/2019 Ammad FYP

    26/40

    26

    PASSWORD SECURITY

  • 8/14/2019 Ammad FYP

    27/40

    Password Security

    Password?

    A password is a secret word or string of characters that is used to

    prove identity or gain access to a resource. The password must be kept

    secret from those not allowed access.

    Fingerprint is the state of art security measure as compared to

    password and other conventional security methods. But in our project we

    have summed up both the fingerprint and password security in order to

    design a more secure and efficient security system. Since our project design

    and simulation is in matlab so we have used matlab coding to implement this

    task. The steps used in method are as follow.

    1. First of all an array of passwords is saved in m file of matlab.

    2. When a user wants to enter the system he must enter the password

    to get access.

    3. When the password is entered it is matched with the already stored

    passwords in the m file.

    4. If the entered password matches with any of the passwords in the

    array stored in the m file then the password matches dialogue box appears.

    5. If the password does not matches with any of the passwords stored

    in the array then an unmatched messages is displayed and access is not

    granted to the user.

    27

    http://en.wikipedia.org/wiki/Wordhttp://en.wikipedia.org/wiki/Character_(computing)http://en.wikipedia.org/wiki/Secrecyhttp://en.wikipedia.org/wiki/Character_(computing)http://en.wikipedia.org/wiki/Secrecyhttp://en.wikipedia.org/wiki/Word
  • 8/14/2019 Ammad FYP

    28/40

    In our project the Password security works and is presented in the

    following way as shown in different figures.

    6.2 Password GUI

    a). when the user enters the Enter Password button a dialogue boxappears asking the user to enter password.

    Password GUI 1

    28

  • 8/14/2019 Ammad FYP

    29/40

    b). when the user enters the password and presses OKon the dialogue

    box another dialogue box appears showing whether the password is matched

    or not.

    Password GUI 2

    29

  • 8/14/2019 Ammad FYP

    30/40

    30

    SYSTEM GUI AND ITS

    USER MANUAL

  • 8/14/2019 Ammad FYP

    31/40

    7.1 GUI User Manual

    We have presented our project in matlab GUI. Following are different

    steps showing its operation.

    1. Open the matlab 6.0 or above.

    2. In the matlab command window type fig1 and press enter.

    Matlab Command Window

    31

  • 8/14/2019 Ammad FYP

    32/40

    The following window will appear when we press enter in the above

    figure.

    Main GUI Window

    There are three main panels in the main window as shown in the above

    figure. There is a control panel, view panel and exit panel. Control panel have

    two buttons of which match images is of main importance. The view panel

    shows different buttons used for performing different operations on the two

    images.

    32

  • 8/14/2019 Ammad FYP

    33/40

    3. From the file menu click open and load two images as show in the

    figure below.

    GUI Loading Images

    4. After loading the two images we can view the images by clicking on

    the view images button in the view panel as show below.

    33

  • 8/14/2019 Ammad FYP

    34/40

    GUI View Images

    5. By clicking on the View Transform buttonin the View Panel we can

    view the transformed image after different image preprocessing and

    post processing algorithms applied as show below.

    34

  • 8/14/2019 Ammad FYP

    35/40

    Transformed Images

    6. When we click the histograms button in the view panel, the

    histograms of the two images are shown as in the figure below.

    35

  • 8/14/2019 Ammad FYP

    36/40

    Histogram of Original Images

    36

  • 8/14/2019 Ammad FYP

    37/40

    7. Click on the Hist Equalization to view the equalized histogram of

    the two images as shown below.

    Histogram Of Images After Equalization

    8. when we click the match images, it compares the two images and

    displays the result. If the two fingerprint images match then a

    message box is shown showing Fingerprint matched, otherwise

    37

  • 8/14/2019 Ammad FYP

    38/40

    the message box displays Fingerprint dont match as shown

    below.

    Fingerprint Matching Result

    9. In the Control Panel click on Enter Password to enter password for

    authentication. When we click on this button user is asked to enter

    password in the matlab command window. If the password is

    matched a message box appears showing that the password is

    matched otherwise the message box shows that the password did

    not match.

    38

  • 8/14/2019 Ammad FYP

    39/40

    Password Matching Result

    39

    CONCLUSION

  • 8/14/2019 Ammad FYP

    40/40

    Conclusion

    In our project we have combined biometric i.e. fingerprint and

    conventional security i.e. password security system. The conventional

    password security has several advantages as well as disadvantages. Those

    disadvantages have been overcome by using it with fingerprint securitysystem. So overall system has both the advantages of the state of art

    biometric and conventional security system which makes it more powerful

    than either of the two security measures. The efficiency of the fingerprint

    security system mainly depends upon the accuracy and the response time.

    Keeping these two things in mind we have used robust algorithms giving us

    fast response time and accuracy.

    Future work

    Following are the some of the recommendations and future work that

    can be done in order to enhance the system further.

    1. There is a need in fingerprint security system to detect

    whether the fingerprint is from a living user or not.

    Experiments have shown that fingerprint security systems can

    be fooled by using copy of the fingerprint from a user.

    2. Several biometric may be combined i.e. multi biometric

    security system may be used in order further increase the

    security and efficiency.

    3. It is obvious that biometric systems will govern the security

    domain in future electronic world. So due increase in usage

    the identification speed and accuracy will be the crucial

    factors. Therefore the algorithms may be optimized in such a

    way in order to meet these demands.