5
2 nd International Conference on Engineering Innovations and Solutions (2'ICEIS 2017) Seventh Sense Research Group www.internationaljournalssrg.org Page 151 Secured Fingerprint Recognition for Automatic Ration Management System V. Kovendan 1 Assistant Professor, Department of computer science, Sri Venkateswaraa College of Technology Oragadam, Sriperumbudur, TN, India AbstractFingerprint recognition refers to the automatic method of identifying or confirming the identity of an individual based on the comparison of two fingerprints. Fingerprint recognition is one of the most well known biometrics and it is by far the most used biometric solution for authentication on computerized systems. Three techniques used to identify the finger print are silicon, optical and ultrasound. Hence this technology is implemented in the newly designed rationing system. The present system in the ration shops is like the shopkeeper sees the ration book of the user and gives the quantity of grocery the user asks for. But there will not be proper regularity in issuing the grocery items to the user. Sometimes even there may be chance that different users take the grocery on same ration cards. To avoid all these issues, we have designed secure fingerprint recognition for automatic ration management system. KeywordsADMEGA Microcontroller, Finger print, GCM Module, PC, Solenoid control circuits. I. INTRODUCTION Public distribution system is an Indian food security system. Major commodities distributed include staple food grains, such as wheat, rice, sugar, and kerosene, through a network of fair price shops established in several states across the country. Food Corporation of India, a government entity, manages the public distribution system. The system is often blamed for its inefficiency and rural-urban bias. It has not been able to fulfill the objective for which it was formed card .Government of India provides various facilities for ration distribution towards poor and needy people. In months, if not buy the materials at the end of the month, they will sale to others without any intimation to the government and customers, so the shopkeepers are misusing of these materials by selling in the market and doing corruption. Public Distribution System is one of the widely controversial issues that involve malpractice. The proposed system aids to control the corruption which is taking place in ration shop by replacing manual work with automatic system based on ADMEGA microcontroller. We can also add, update and delete the details of the family member’s information easily. Once consumer is validated by finger print password, the system asks the consumer to select appropriate material and quantity of material through keypad. Based on material chosen by consumer, appropriate circuitry will be activated and consumer gets material. N. Nivetha 2 , IV year CSE Department of computer science, Sri Venkateswaraa College of Technology Oragadam, Sriperumbudur, TN, India GCM interfaced with microcontroller sends information in the form of SMS to related people. The proposed automatic fingerprint ration shop system would bring transparency in public distribution system and become helpful to prevent malpractices. 1.1 Existing Work In the previous system (fig.1) shopkeeper sees the ration book of the consumer and then provides the grocery the user asks for. User information is maintained manually in the notebook and there will not be proper regularity in providing the grocery items. Fig.1 Architecture of Ration system 1.2. Related Work: GCM (fig.2) uses XMPP protocol for message generation purpose. Where the XMPP and HTTP protocol are interconnected with the Google cloud messaging server with the help of these two protocol GCM server will send an SMS to the consumer’s mobile phone. Fig.2 Google Cloud Messaging II. PROPOSED CONTRIBUTION Proposed system aids to control the corruption and provides the commodities to the needy and poor people regularly. In proposed system we develop web application for maintaining the ration networks data. It stores the member’s information with finger print GCM HTTP XMPP Android IOS Chrome User Ration shop (With ration card) Get the groceries Ration book Family Information

Secured Fingerprint Recognition for Automatic … the above review study we are going to implement finger print based ration management system (fig.3), fingerprint recognition refers

Embed Size (px)

Citation preview

2nd

International Conference on Engineering Innovations and Solutions (2'ICEIS – 2017)

Seventh Sense Research Group www.internationaljournalssrg.org Page 151

Secured Fingerprint Recognition for

Automatic Ration Management System

V. Kovendan1 Assistant Professor,

Department of computer science,

Sri Venkateswaraa College of Technology

Oragadam, Sriperumbudur, TN, India

Abstract— Fingerprint recognition refers to the

automatic method of identifying or confirming the identity

of an individual based on the comparison of two

fingerprints. Fingerprint recognition is one of the most well

known biometrics and it is by far the most used biometric

solution for authentication on computerized systems. Three

techniques used to identify the finger print are silicon,

optical and ultrasound. Hence this technology is

implemented in the newly designed rationing system. The

present system in the ration shops is like the shopkeeper

sees the ration book of the user and gives the quantity of

grocery the user asks for. But there will not be proper

regularity in issuing the grocery items to the user.

Sometimes even there may be chance that different users

take the grocery on same ration cards. To avoid all these

issues, we have designed secure fingerprint recognition for

automatic ration management system.

Keywords— ADMEGA Microcontroller, Finger

print, GCM Module, PC, Solenoid control circuits.

I. INTRODUCTION

Public distribution system is an Indian food security system. Major commodities distributed include staple food grains, such as wheat, rice, sugar, and kerosene, through a network of fair price shops established in several states across the country. Food Corporation of India, a government entity, manages the public distribution system. The system is often blamed for its inefficiency and rural-urban bias. It has not been able to fulfill the objective for which it was formed card .Government of India provides various facilities for ration distribution towards poor and needy people. In months, if not buy the materials at the end of the month, they will sale to others without any intimation to the government and customers, so the shopkeepers are misusing of these materials by selling in the market and doing corruption. Public Distribution System is one of the widely controversial issues that involve malpractice. The proposed system aids to control the corruption which is taking place in ration shop by replacing manual work with automatic system based on ADMEGA microcontroller. We can also add, update and delete the details of the family member’s information easily. Once consumer is validated by finger print password, the system asks the consumer to select appropriate material and quantity of material through keypad. Based on material chosen by consumer, appropriate circuitry will be activated and consumer gets material.

N. Nivetha2, IV year CSE

Department of computer science,

Sri Venkateswaraa College of Technology

Oragadam, Sriperumbudur, TN, India

GCM interfaced with microcontroller sends information in the form of SMS to related people. The proposed automatic fingerprint ration shop system would bring transparency in public distribution system and become helpful to prevent malpractices.

1.1 Existing Work

In the previous system (fig.1) shopkeeper sees the ration book of the consumer and then provides the grocery the user asks for. User information is maintained manually in the notebook and there will not be proper regularity in providing the grocery items.

Fig.1 Architecture of Ration system

1.2. Related Work:

GCM (fig.2) uses XMPP protocol for message

generation purpose. Where the XMPP and HTTP

protocol are interconnected with the Google cloud

messaging server with the help of these two protocol

GCM server will send an SMS to the consumer’s

mobile phone.

Fig.2 Google Cloud Messaging

II. PROPOSED CONTRIBUTION

Proposed system aids to control the corruption and provides the commodities to the needy and poor people regularly. In proposed system we develop web application for maintaining the ration networks data. It stores the member’s information with finger print

GCM HTTP

XMPP

Android

IOS

Chrome

User Ration shop

(With ration card)

Get the

groceries

Ration book Family

Information

vts-4
Text Box
ISSN : 2348 - 8387 www.internationaljournalssrg.org Page 56
vts-4
Text Box
SSRG International Journal of Computer Science and Engineering - (2'ICEIS - 2017) - Special Issue - April 2017

2nd

International Conference on Engineering Innovations and Solutions (2'ICEIS – 2017)

Seventh Sense Research Group www.internationaljournalssrg.org Page 152

based authentication. Only with the users finger print their information can be stored and retrieved [14].

Every consumer has a unique own finger print id which is registered by the Government authority. From this system we can avoid the misuse of our card by others and this system is highly secure with this system we can add, update, and delete the family members in to the ration network instantly. It is an automated process, manual intervention is less and there is no need of keeping an account of all purchased details in the notebook. All the details are stored in the database and the purchased details are notified to the consumers by sending an SMS to the family members. The purchased overall groceries are updated in the government database, so that this process will avoid corruption.

III. IMPLEMENTATION

From the above review study we are going to

implement finger print based ration management

system (fig.3), fingerprint recognition refers to the

automatic method of identifying or confirming the

identity of an individual based on the comparison of

two fingerprints [13]. Fingerprint recognition (fig.4)

is one of the most well known biometrics and it is by

far the most used biometric solution for

authentication on computerized systems.

The ration system is only based on the finger

print authentication. Each user must be authenticated

with finger print based ration card information, not

only user including shopkeeper also. First we store all

family members’ information with finger print and

photograph based authentication, so using this system

one of the family members can buy grocery items of

over ration card. The system must include the display

which must show the following information’s

Fig.3 Automatic rationing system

User 1

Card no.8975538244

Balance material: rice-20kg, oil-5 liter

Delivered material:12.35pm,06/2/2017

Available material in ration shop

Rice-100kg, oil-50litre, wheat-200kg

User 2

Invalid id

Fig.4 Finger print Recognition

IV. METHODS AND ALGORITHMS:

The existing conventional ration distribution

system has two basic issues one is renewing the

ration card every year and corruption done by the

employees by selling the grocery items in market

with less price .this can be overcome by using finger

print sensor and Google cloud messaging (GCM) is a

globally accepted standard for digital cellular

communication. This system can be implemented

with help of ADMEGA microcontroller [8].

A. AES Algorithm:

Advanced Encryption Standard Algorithm basically

supersedes the Data Encryption Standard (DES).

The algorithm runs in following steps:

(1) Derive the set of round keys from the cipher

key.

(2) Initialize the state array with the block data

(plaintext).

(3) Add the initial round key to the starting state

array.

(4) Perform nine rounds of state manipulation.

(5) Perform the tenth and final round of state

manipulation.

(6) Copy the final state array out as the encrypted

data (cipher text).

B. Automatic ration system using ADMEGA

microcontroller:

It has 8 Kb (fig.5) of Flash program memory

1Kbyte Internal SRAM I/O Ports: 23 I/ line can be

obtained from three ports; namely Port B, Port C and

Port D. T External Interrupt source, located at port D.

19 different interrupt vectors supporting 19 events

generated by internal peripherals.

Three Internal Timers are available, two 8 bit,

one 16 bit, offering various operating modes and

User

Finger print

verification

Ration

server

Buy

groceries Add

Update

Delete

With

finger print Database

vts-4
Text Box
ISSN : 2348 - 8387 www.internationaljournalssrg.org Page 57
vts-4
Text Box
SSRG International Journal of Computer Science and Engineering - (2'ICEIS - 2017) - Special Issue - April 2017

2nd

International Conference on Engineering Innovations and Solutions (2'ICEIS – 2017)

Seventh Sense Research Group www.internationaljournalssrg.org Page 153

supporting internal or external clocking. (Serial

Peripheral interface) ATmega8 holds three

communication devices integrated. One of the most

powerful communication solutions is USART and

ATmega8 supports both synchronous and

asynchronous data transfer schemes.

Fig. 5 AGMEGA pin configuration

C. Finger Print Verification Algorithm

This Algorithm is used for the verification

purpose. It analyses (fig.6) the acquired finger print

image [15] with the stored finger print image which a

user already stored in the database and checks

whether the finger print matches or not. If the finger

print matches then the access is granted or else access

will be denied, by using this fingerprint matching

system we can provide the security from

unauthorized persons accessing the customers

information.

Fig.6 Finger print Matching

This fingerprint algorithm runs in following

steps, first the fingerprint was acquired by using the

reader and the image was processed by segmentation,

normalization, orientation estimation, ridge frequency

estimation, and binarization and thinning [11], [12].

The steps are as followed

i. Segmentation:

Segmentation is the process of separating the

foreground regions in the image from the background

region.

𝒗 𝒌 = 𝟏

𝒘𝟐 (𝑰 𝒊, 𝒋 − 𝑴(𝒌))

𝒘−𝟏

𝒋=𝟎

𝒘−𝟏

𝒊=𝟎

ii. Normalization

Normalization is used to standardize the intensity

values in an image by adjusting the range of grey-

level values so that it lies within a desired range of

values.

𝑵 𝒊, 𝒋 =

𝑴𝒐 + 𝑽𝒐(𝑰 𝒊, 𝒋 − 𝑴)𝟐

𝑽

𝑴𝒐 − 𝑽𝒐(𝑰 𝒊, 𝒋 − 𝑴)𝟐

𝑽

iii. Orientation Estimation

The orientation estimation is a fundamental

step in the future enhancement process as the

subsequent Gabor filtering stage relies on the local

orientation in order to effectively enhance the

fingerprint image.

𝒗𝒙 𝒊, 𝒋 = 𝟐𝝏𝒙(𝒖, 𝒗)𝝏𝒚(𝒖,𝒗)

𝒋+𝒘𝟐

𝒗=𝒋−𝒘𝟐

𝒊+𝒘𝟐

𝒖=𝒊−𝒘𝟐

𝒗𝒙 𝒊, 𝒋 = (𝝏𝒙𝟐 𝒖, 𝒗 𝝏𝒚

𝟐 𝒖, 𝒗 )

𝒋+𝒘𝟐

𝒗=𝒋−𝒘𝟐

𝒊+𝒘𝟐

𝒖=𝒊−𝒘𝟐

𝜽 𝒊, 𝒋 = 𝟏

𝟐𝒕𝒂𝒏−𝟏

𝒗𝒙(𝒊, 𝒋)

𝒗𝒚(𝒊, 𝒋)

iv. Ridge Frequency Estimation:

In addition to the orientation image, another

important parameter that is used in the construction of

the Gabor filter is the local ridge frequency. The

frequency image represents the local frequency of the

ridges in a fingerprint.

𝑭 𝒊, 𝒋 =𝟏

𝑺(𝒊, 𝒋)

v. Binarization:

Binarization is the process that converts a grey

level image into a binary image. This improves the

contrast between the ridges and valleys in a

fingerprint image, and consequently facilitates the

extraction of minutiae.

Not

Matches

Matches Access Granted

Access

Denied

vts-4
Text Box
ISSN : 2348 - 8387 www.internationaljournalssrg.org Page 58
vts-4
Text Box
SSRG International Journal of Computer Science and Engineering - (2'ICEIS - 2017) - Special Issue - April 2017

2nd

International Conference on Engineering Innovations and Solutions (2'ICEIS – 2017)

Seventh Sense Research Group www.internationaljournalssrg.org Page 154

𝑬 𝒊, 𝒋 = 𝑮(𝒖, 𝒗, 𝟎 𝒊, 𝒋 , 𝒇(𝒊, 𝒋)

𝒘𝒚𝒍𝟐

𝒗𝒛−𝒘𝒚𝒍𝟐

𝒘𝒙𝒍𝟐

𝒚𝒛−𝒘𝒙𝒍𝟐

vi. Thinning:

Thinning is a morphological operation that

successively erodes away the foreground pixels until

they are one pixel wide.

𝒏𝟎 𝑻 = 𝒑(𝒊)

𝑵−𝟏

𝒊=𝑻

V. MESSAGE GENERATION SYSTEM

In this module we generate SMS to family

header phone, when the grocery items is purchased

from the ration shop the purchased information are

stored in database for future verification and also

send as an SMS to all the members of the family.

When ration staff update product Quantity in the

website that information also send as an SMS to all

the family in that region. GCM uses XMPP protocol

for message generation purpose. Where the XMPP

and HTTP are interconnected with the Google cloud

messaging server with the help of these two protocol

GCM server will send an SMS to the consumer’s

mobile.

Fig.7 Message Generation from PDS

VI. CONCLUSION

Fingerprint verification method is the most

popular method among all the biometrics methods for

identification/verification of a person. By using the

extraction algorithm and finger print verification

algorithm captured finger print image is scanned and

verified then the image undergoes several process

like segmentation, orientation, butrification and

thinning hence by doing all these process the finger

print of one person cannot be hacked by others and

this process is more secure than the previous works.

Hence we implemented this technology in this system

which portrays the Automation of the Public

Distribution System (PDS) and its recompense over

the present fair price shops. It will help the country's

economy to reach new heights. The automatic PDS is

easy to implement and requires much less hard work

when compared to the other system using of this

system we can avoid the malfunctions because there

is no manual operations. Now in a new system all

information is stored in database, so implementing

this will be really helpful to the people below poverty

line. In future this system can be implemented to the

Indian rationing system to lead our country in an

uncorrupted way. We can control the corruption

taking place in the PDS as this system is fully based

on finger print technology it is not as easier to view

and hack the details of other users and it is highly

secured.

ACKNOWLEDGMENT

It gives us a great pleasure to express my

boundless sense of gratitude to each and every person

who helped us with hand in completing this humble

piece of work. We wish to express our sincere thanks

to our honorable Chairman, Vice Chairman,

Principal, and I am grateful to extend my sincere

thanks to our beloved Head of the Department for

supporting us to lead this work in successful path.

REFERENCE

[1] Parvathy A, Venkata Rohit Raj, Venumadhav, Manikanta,

“RFID Based Exam Hall Maintenance /System’’, IJCA Special

Issue on “Artificial Intelligence Techniques - Novel Approaches &

Practical Applications” AIT, 2011

[2] Gyanendra K Verma, Pawan Tripathi, “A Digital Security

System with Door Lock System Using finger print Technology”,

International Journal of Computer Applications (IJCA) (0975 –

8887), Volume 5– No.11, August 2010

[3] Kumar Chaturvedula .U.P, “RFID Based Embedded System for

Vehicle Tracking and Prevention of Road Accidents”, International

Journal of Engineering Research & Technology (IJERT), Vol. 1

Issue 6, August – 2012, ISSN: 2278-0181.

[4]R.Ramani ,S. Selvaraju, S.Valarmathy, P.Niranjan, “Bank

Locker security System Based on RFID (finger print) and GSM

Technology”, International Journal of Computer Applications

(IJCA) (0975 – 8887) Volume 57– No.18, November 2012

[5] Swati R.Zope, Prof. Maruti Limkar, “RFID based Bill

Generation and Payment through Mobile”, International Journal of

Computer Science and Network (IJCSN) Volume 1, Issue 3, June

2012 www.ijcsn.org ISSN 2277-5420

vts-4
Text Box
ISSN : 2348 - 8387 www.internationaljournalssrg.org Page 59
vts-4
Text Box
SSRG International Journal of Computer Science and Engineering - (2'ICEIS - 2017) - Special Issue - April 2017

2nd

International Conference on Engineering Innovations and Solutions (2'ICEIS – 2017)

Seventh Sense Research Group www.internationaljournalssrg.org Page 155

[6] Kumar Chaturvedula .U.P, “RFID Based Embedded System for

Vehicle Tracking and Prevention of Road Accidents”, International

Journal of Engineering Research & Technology (IJERT) Vol. 1

Issue 6, August - 2012 ISSN: 2278-0181

[7] J. Bringer,H.Chabanne, D. Pointcheval, and Q. Tang. Extended

private information retrievaland its application in biometrics finger

print authentications. In CANS,2007.

[8] N.Delvaux, H. Chabanne, J. Bringer,B.Kindarji, P. Lindeberg,

J. Midgren, J. Breebaart, T. Akkermans, M. vander Veen, R.

Veldhuis, E. Kindt, K. Simoens, C. Busch, P. Bours, D. Gafurov,

B. Yang, J. Stern, C. Rust, B. Cucinelli, and D. Skepastianos.

Pseudo idenitities based on fingerprint characteristics.

[9] S. Draper,A.Khisti, E. Martinian, A. Vetro, and J. Yedidia.

Using distributed source coding to secure fingerprint biometrics. In

Mitsubishi Electric Research Labs, 2007.

[10] Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar,

”Handbook of Fingerprint Recognition”, Springer-verlag, 2003, pp.

22-23.

[11]Fingerprint Identification System Based On Neural Network

Mr. Lokhande S.K., Prof. Mrs. Dhongde V.S. ME (VLSI &

Embedded Systems), Vishwabharati Academy’s College of

Engineering, Ahmednagar (MS), India.

[12] Overview of fingerprint recognition system, Mouad. M. H.

Ali; Vivek H. Mahale; Pravin Yannawar; A. T. Gaikwad. 2016

International Conference on Electrical, Electronics, and

Optimization Techniques (ICEEOT)

[13] A survey on fingerprint biometric recognition system, Varsha

J. Rathod; Nalini C. Iyer; Meena S M, 2015 International

Conference on Green Computing and Internet of Things

(ICGCIoT)

[14] A Study of Biometric Approach Using Fingerprint

Recognition Ravi Subban and Dattatreya P. Mankame

[15] Template security for fingerprint recognition System with two

variables polynomial of fuzzy vault for minutiae points

Mahananda. D.Malkauthekar 2015 International Conference on

Communications and Signal Processing (ICCSP)

vts-4
Text Box
ISSN : 2348 - 8387 www.internationaljournalssrg.org Page 60
vts-4
Text Box
SSRG International Journal of Computer Science and Engineering - (2'ICEIS - 2017) - Special Issue - April 2017