Upload
chethan-g-shashidhar
View
216
Download
0
Embed Size (px)
Citation preview
8/4/2019 Tech Papers
1/26
WELCOME TO SRI SAI ANGELS PRE-UNIVERSITY COLLEGEs
TECHNOLEDGE PRESENTATION
COMET UTSAV 2011
8/4/2019 Tech Papers
2/26
Towards A Better Tomorrow...
TECH TEAM
8/4/2019 Tech Papers
3/26
Chethan.G.S & N.R.Ajay
8/4/2019 Tech Papers
4/26
Embedded SystemEmbedded System
An embedded system is a special-
purpose system in which the
computer is completely
encapsulated by or dedicated to the
device or system it controls. Unlike a
general-purpose computer, such as a
personal computer, an embedded
system performs one or a few pre-
defined tasks, usually with very
specific requirements
ATM CENTERS
MEDICAL FIELDS
DEFENCE
AVIATION
8/4/2019 Tech Papers
5/26
You cant ESCAPE !!!
8/4/2019 Tech Papers
6/26
BiometricsBiometrics
The study of automated identification,
by use of physical or behavioral traits.
This technology can be used in security
purposes, Institute managements,
Transporting systems and many more..
Behavioral
8/4/2019 Tech Papers
7/26
BiometricsBiometrics-- PHYSICALPHYSICAL
As we know thatBiometric iscommonly used for identificationpurposes, and regarding for thehuman beings the following
characteristics' (to right of thescreen) can be easily determinedand if fault is found, the culprit canbe caught more than often usingmany security controls.
Fingerprint
Iris
Ear
Face
Retina
Hands
8/4/2019 Tech Papers
8/26
BiometricsBiometrics--BEHAVIORALBEHAVIORAL
In human beings we can see manyvaries from person to person fromour eyes to even the hair styles ..
Though the worlds population is
more than 650+ crores, a singlepersons handwriting or the anothercharacter cannot be copied as same.
And of courseBehavioral characteralso plays an important role in
security system.
Signature
Walking gait
Typing patterns
8/4/2019 Tech Papers
9/26
BiometricsBiometrics-- ADVANTAGESADVANTAGES
Biometrics has got both advantagesand disadvantages, as it is a humancreated program.
Biometrics has no risk of
Forgetting it
Loosing it
Getting it stolen
Getting it copied
Being used by anyone else.
8/4/2019 Tech Papers
10/26
SCHEMATIC REPRESENTATION OF BIOMETRICS
8/4/2019 Tech Papers
11/26
An application of BIOMETRICS
You cant ESCAPE !!!You cant ESCAPE !!!
8/4/2019 Tech Papers
12/26
FINGERPRINT IDENTIFICATIONFINGERPRINT IDENTIFICATION
Fingerprint identification
process consists of two essential
procedures: enrollment and
authentication.
8/4/2019 Tech Papers
13/26
8/4/2019 Tech Papers
14/26
Image AcquisitionImage Acquisition
This includes the scanning of the finger tip,where it reads the finger scales which areunique.
Real-time image acquisition method isroughly classified into optical and non-optical
Optical method relies on the totalreflection phenomenon on the surface ofglass or reinforced plastic where thefingertip is in contact
Non-Optical involves the exploitation ofelectrical characteristics such ascapacitance & non-electricalcharacteristics like heat.
8/4/2019 Tech Papers
15/26
Feature ExtractionFeature Extraction
This includes the extraction of some of
the features of the finger print obtained.
There are two main ways to compare an
input fingerprint image and registered
fingerprint data .
One is to compare an image with
another image directly.
The other is to compare just the
important features extracted.
8/4/2019 Tech Papers
16/26
MatchingMatching
This includes the matching of the
fingerprint extracted.
There are two main ways to match the
fingerprint image .
The first one is 1:1 matching. It is aprocedure in which a user claims his/her
identity by means of an ID and proves it
with a fingerprint.
Other is 1:N matching. This includes a
procedure where the system determinesthe user's identity by comparing the input
fingerprint with the information in the
database without asking for the user's
claim.
8/4/2019 Tech Papers
17/26
Automatic Teller Machine (ATM)
8/4/2019 Tech Papers
18/26
& KEYPAD, LCD, BUZZER, LOCKER SYSTEM, ADDITIONAL MEMORY (EEPROM)
8/4/2019 Tech Papers
19/26
8/4/2019 Tech Papers
20/26
8/4/2019 Tech Papers
21/26
8/4/2019 Tech Papers
22/26
A step by step approach in designing the microcontroller basedA step by step approach in designing the microcontroller based
system for securing the transactions of the user and providing thesystem for securing the transactions of the user and providing the
security for the locker system and even more for the PASSPORTsecurity for the locker system and even more for the PASSPORT
verification using a finger print scanner has been followed. Theverification using a finger print scanner has been followed. The
result obtained in providing the security is quite reliable in all theresult obtained in providing the security is quite reliable in all the
three modes.three modes.
The system has successfully overcome some of the aspects existingThe system has successfully overcome some of the aspects existing
with the present technologies, by the use of finger printBiometricwith the present technologies, by the use of finger printBiometric
as the authentication Technology.as the authentication Technology.
8/4/2019 Tech Papers
23/26
Dharma Prasad.
Dept. of CS.Sri Sai Angels PU College.
Rekha.Dept. of Electronics.
Sri Sai Angels PU College.
8/4/2019 Tech Papers
24/26
FOR HAVING A LOOK ON OUR PRESENTATION.
HOPE YOU LIKED IT.
8/4/2019 Tech Papers
25/26
COMET UTSAV 2011 FOR PROVIDING US A PLATFORM
FOR VIEWING THIS PRESENTATION.
8/4/2019 Tech Papers
26/26
Sri Sai Angels Institute TECH TEAM Comet Career Solutions
Data created on: 19-08-2011 / 22.10 HRS Doc. No.: AC/11/002