Tech Papers

Embed Size (px)

Citation preview

  • 8/4/2019 Tech Papers

    1/26

    WELCOME TO SRI SAI ANGELS PRE-UNIVERSITY COLLEGEs

    TECHNOLEDGE PRESENTATION

    COMET UTSAV 2011

  • 8/4/2019 Tech Papers

    2/26

    Towards A Better Tomorrow...

    TECH TEAM

  • 8/4/2019 Tech Papers

    3/26

    Chethan.G.S & N.R.Ajay

  • 8/4/2019 Tech Papers

    4/26

    Embedded SystemEmbedded System

    An embedded system is a special-

    purpose system in which the

    computer is completely

    encapsulated by or dedicated to the

    device or system it controls. Unlike a

    general-purpose computer, such as a

    personal computer, an embedded

    system performs one or a few pre-

    defined tasks, usually with very

    specific requirements

    ATM CENTERS

    MEDICAL FIELDS

    DEFENCE

    AVIATION

  • 8/4/2019 Tech Papers

    5/26

    You cant ESCAPE !!!

  • 8/4/2019 Tech Papers

    6/26

    BiometricsBiometrics

    The study of automated identification,

    by use of physical or behavioral traits.

    This technology can be used in security

    purposes, Institute managements,

    Transporting systems and many more..

    Behavioral

  • 8/4/2019 Tech Papers

    7/26

    BiometricsBiometrics-- PHYSICALPHYSICAL

    As we know thatBiometric iscommonly used for identificationpurposes, and regarding for thehuman beings the following

    characteristics' (to right of thescreen) can be easily determinedand if fault is found, the culprit canbe caught more than often usingmany security controls.

    Fingerprint

    Iris

    Ear

    Face

    Retina

    Hands

  • 8/4/2019 Tech Papers

    8/26

    BiometricsBiometrics--BEHAVIORALBEHAVIORAL

    In human beings we can see manyvaries from person to person fromour eyes to even the hair styles ..

    Though the worlds population is

    more than 650+ crores, a singlepersons handwriting or the anothercharacter cannot be copied as same.

    And of courseBehavioral characteralso plays an important role in

    security system.

    Signature

    Walking gait

    Typing patterns

  • 8/4/2019 Tech Papers

    9/26

    BiometricsBiometrics-- ADVANTAGESADVANTAGES

    Biometrics has got both advantagesand disadvantages, as it is a humancreated program.

    Biometrics has no risk of

    Forgetting it

    Loosing it

    Getting it stolen

    Getting it copied

    Being used by anyone else.

  • 8/4/2019 Tech Papers

    10/26

    SCHEMATIC REPRESENTATION OF BIOMETRICS

  • 8/4/2019 Tech Papers

    11/26

    An application of BIOMETRICS

    You cant ESCAPE !!!You cant ESCAPE !!!

  • 8/4/2019 Tech Papers

    12/26

    FINGERPRINT IDENTIFICATIONFINGERPRINT IDENTIFICATION

    Fingerprint identification

    process consists of two essential

    procedures: enrollment and

    authentication.

  • 8/4/2019 Tech Papers

    13/26

  • 8/4/2019 Tech Papers

    14/26

    Image AcquisitionImage Acquisition

    This includes the scanning of the finger tip,where it reads the finger scales which areunique.

    Real-time image acquisition method isroughly classified into optical and non-optical

    Optical method relies on the totalreflection phenomenon on the surface ofglass or reinforced plastic where thefingertip is in contact

    Non-Optical involves the exploitation ofelectrical characteristics such ascapacitance & non-electricalcharacteristics like heat.

  • 8/4/2019 Tech Papers

    15/26

    Feature ExtractionFeature Extraction

    This includes the extraction of some of

    the features of the finger print obtained.

    There are two main ways to compare an

    input fingerprint image and registered

    fingerprint data .

    One is to compare an image with

    another image directly.

    The other is to compare just the

    important features extracted.

  • 8/4/2019 Tech Papers

    16/26

    MatchingMatching

    This includes the matching of the

    fingerprint extracted.

    There are two main ways to match the

    fingerprint image .

    The first one is 1:1 matching. It is aprocedure in which a user claims his/her

    identity by means of an ID and proves it

    with a fingerprint.

    Other is 1:N matching. This includes a

    procedure where the system determinesthe user's identity by comparing the input

    fingerprint with the information in the

    database without asking for the user's

    claim.

  • 8/4/2019 Tech Papers

    17/26

    Automatic Teller Machine (ATM)

  • 8/4/2019 Tech Papers

    18/26

    & KEYPAD, LCD, BUZZER, LOCKER SYSTEM, ADDITIONAL MEMORY (EEPROM)

  • 8/4/2019 Tech Papers

    19/26

  • 8/4/2019 Tech Papers

    20/26

  • 8/4/2019 Tech Papers

    21/26

  • 8/4/2019 Tech Papers

    22/26

    A step by step approach in designing the microcontroller basedA step by step approach in designing the microcontroller based

    system for securing the transactions of the user and providing thesystem for securing the transactions of the user and providing the

    security for the locker system and even more for the PASSPORTsecurity for the locker system and even more for the PASSPORT

    verification using a finger print scanner has been followed. Theverification using a finger print scanner has been followed. The

    result obtained in providing the security is quite reliable in all theresult obtained in providing the security is quite reliable in all the

    three modes.three modes.

    The system has successfully overcome some of the aspects existingThe system has successfully overcome some of the aspects existing

    with the present technologies, by the use of finger printBiometricwith the present technologies, by the use of finger printBiometric

    as the authentication Technology.as the authentication Technology.

  • 8/4/2019 Tech Papers

    23/26

    Dharma Prasad.

    Dept. of CS.Sri Sai Angels PU College.

    Rekha.Dept. of Electronics.

    Sri Sai Angels PU College.

  • 8/4/2019 Tech Papers

    24/26

    FOR HAVING A LOOK ON OUR PRESENTATION.

    HOPE YOU LIKED IT.

  • 8/4/2019 Tech Papers

    25/26

    COMET UTSAV 2011 FOR PROVIDING US A PLATFORM

    FOR VIEWING THIS PRESENTATION.

  • 8/4/2019 Tech Papers

    26/26

    Sri Sai Angels Institute TECH TEAM Comet Career Solutions

    Data created on: 19-08-2011 / 22.10 HRS Doc. No.: AC/11/002