ABSTRACT
Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for automatically computerized recognition systems. Fingerprints are the most widely used form of biometric recognition system successfully. However, fingerprint images are rarely of perfect quality. They may be degraded and corrupted due to variations in skin and impression conditions. Thus, image enhancement techniques are employed prior to minutiae extraction to obtain a more reliable estimation of minutiae locations. Minutiae extraction yielded many minutiae resulting from fingerprint irregularities. The aim of this work is the development of a biometric access control system for restricted areas based on individual fingerprint and Gabor filter for enhancement process, the development system architecture, demonstrating the components, enhancement, minutiae and thatching techniques are presented. A software application is written in Python to implement algorithms for enhancement, minutiae extraction and matching processing. The resulting minutiae information will be used as a method of identifying matching fingerprints. Also it will be used to register this fingerprint in system database. Finally, verification system, and identification system are implemented. Registration system has facilities namely; automatic registration, manual registration and update for the database to help the administrator to update required information. Based on that processing, an integrated secure system for biometric access control is developed for restricted area with acceptable security level.
TABLE OF CONTENTS
Title page i
Approval Page ii
Dedication iii
Acknowledgement iv
Table of Contents v
List of Tables ix
List of Figures x
Abstract xi
CHAPTER ONE
INTRODUCTION
1.1. Introduction
1.2. Background of the Study
1.3. Statement of Problem
1.4. Aim and Objective of the Study
1.5. Significance of the Study
1.6. Scope of the Study
1.7. Limitations of the Study
1.8. Definition of Terms
CHAPTER TWO
REVIEW OF RELATED LITERATURE
2.1. Introduction
2.2 Biometric
2.2.1 Biometric functionality
2.2.3 History of biometric
2.3 Biometric device
2.3.1 Application areas of biometric device
2.3.2 Problems with present day biometric
2.5 Biometric tokenization
2.5.1 Information security
2.6 Bank
2.6 Bank verification number
CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN
3.1. Introduction
3.2. Detailed analysis of the existing system
3.2.1. Problems of the existing system
3.3. Research methodology
3.4. Objective of the new system
3.4.1. Feasibility study
3.4.2. Technical feasibility
3.4.3. Operational feasibility
3.4.4. Economic feasibility
3.5.1. Dataflow diagram
3.5.2. Modularity
3.5.3. System flowchart
3.5.4. Program flowchart
3.6. System design
3.6.1. Output design specification
3.6.2. Input design specification
3.6.4 Database specification
3.6.5 Security design specification
CHAPTER FOUR
IMPLEMENTATION, RESULT AND DISCUSSION
4.1. Introduction
4.2. Software development tools and justification
4.3. System requirements
4.3.1. Software requirements
4.3.2. Hardware requirements
4.3.3 People requirements
4.4 Implementation details
4.4.1. Coding
4.4.2. End user training and manual
4.4.3. File conversion
4.4.4. Changeover procedure
4.4.5. Commissioning
4.4.6. Maintenance details
4.5. Results
4.6. System testing
4.7. Discussion
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATION
5.1. Summary
5.3. Recommendation
REFERENCE