Altetred Fingerprints
Altetred Fingerprints
Altetred Fingerprints
1. INTRODUCTION
Fingerprints have been in use for biometric recognition since long because of their
high acceptability, immutability and individuality. Immutability refers to the
persistence of the fingerprints over time whereas individuality is related to the
uniqueness of ridge details across individuals. The probability that two fingerprints
are alike is 1 in 1.9 x 1015 [1]. These features make the use of fingerprints
extremely effective in areas where the provision of a high degree of security is an
issue. The major steps involved in automated fingerprint recognition
include a) Fingerprint Acquisition, b) Fingerprint Segmentation, c) Fingerprint
Image Enhancement, d)Feature Extraction e) Minutiae Matching, f) Fingerprint
Classification. Fingerprint acquisition can either be offline (inked) or Online (Live
scan). In the inked method an imprint of an inked finger is first obtained on a
paper, which is then scanned. This method usually produces images of very poor
quality because of the non-uniform spread of ink and is therefore not exercised in
online AFIS. For onlinefingerprint image acquisition, capacitative or optical
fingerprint scanners such as URU 4000, etc. are utilized which make use of
techniques such as frustrated total internal reflection (FTIR) [2], ultrasound total
internal reflection [3], sensing of differential capacitance [4] and non contact 3D
scanning [5] for image development. Live scan scanners offer much greater image
quality, usually a resolution of 512 dpi, which results in superior reliability during
matching in comparison to inked fingerprints. Segmentation refers to the separation
of fingerprint area (foreground) from the image background [6]. Segmentation is
useful to avoid extraction of features in the noisy areas of fingerprints or the
background. A Simple thresholding technique [7] proves to be ineffective because
of the streaked nature of the fingerprint area. The presence of noise in a fingerprint
image requires more vigorous techniques for effective fingerprint segmentation.
A good segmentation method should exhibit the following characteristics [8]:
It should be insensitive to image contrast
It should detect smudged or noisy regions
Segmentation results should be independent of whether the input image is an
enhanced image or a raw image
The segmentation results should be independent of
image quality Ren et al.proposed an algorithm for segmentation that employs
feature dots, which are then used to obtain a close segmentation curve. The authors
claim that their method surpasses directional field and orientation based methods
for fingerprint image segmentation. Shen et al. proposed a Gabor filter based
method in which eight Gabor filters are convolved with each image block and the
variance of the filter response is used both for fingerprint segmentation and quality
specification. Xian et al proposed a segmentation algorithm that exploits a block’s
cluster degree, mean and variance. An optimal linear classifier is used for
classification with morphological post-processing to remove classification errors.
Bazen et al. proposed a pixel wise technique for segmentation involving a linear
combination of three feature vectors (i.e. gradient coherence, intensity mean and
variance). A final morphological post-processing step is performed to eliminate
holes in both the foreground and background. In spite of its high accuracy this
algorithm has a very high computational complexity, which makes it impractical
for real time processing. Klein et al. proposed an algorithm that employs HMMs to
remove the problem of fragmented segmentation encountered during the use of
different segmentation algorithms.
1.1 Company Profile
1.2 Project overview
In the modern computerized world, it has become more and more important
to authenticate people in a secure way. Modern applications like online banking or
online shopping use techniques that depend on personal identification numbers,
keys, or passwords. Nevertheless, these technologies imply the risk of data being
forgotten, lost, or even stolen. Therefore biometric authentication methods promise
a unique way to be able to authenticate people. A secure and confidential biometric
authentication method is the utilization of fingerprints. Usually a technique called
minutiae matching is used to be able to handle automatic fingerprint recognition
with a computer system.
2. SYSTEM ANALYSIS
2.1 Feasibility System
Preliminary investigation examine project feasibility, the likelihood the system
will be useful to the organization. The main objective of the feasibility study is to
test the Technical, Operational and Economical feasibility for adding new modules
and debugging old running system. All system is feasible if they are unlimited
resources and infinite time. There are aspects in the feasibility study portion of the
preliminary investigation:
Technical Feasibility
Operational Feasibility
Economical Feasibility
TECHNICAL FEASIBILITY
The technical issue usually raised during the feasibility stage of the
investigation includes the following:
OPERATIONAL FEASIBILITY
Proposed projects are beneficial only if they can be turned out into
information system. That will meet the organization’s operating requirements.
Operational feasibility aspects of the project are to be taken as an important part of
the project implementation. Some of the important issues raised are to test the
operational feasibility of a project includes the following: -
The well-planned design would ensure the optimal utilization of the computer
resources and would help in the improvement of performance status.
ECONOMICAL FEASIBILITY
A system can be developed technically and that will be used if installed must
still be a good investment for the organization. In the economical feasibility, the
development cost in creating the system is evaluated against the ultimate benefit
derived from the new systems. Financial benefits must equal or exceed the costs.
2.2EXISTING SYSTEM:
In Existing System, since existing fingerprint quality assessment algorithms
are designed to examine if an image contains sufficient information (say, minutiae)
for matching, they have limited capability in determining if an image is a natural
fingerprint or an altered fingerprint. Obliterated fingerprints can evade fingerprint
quality control software, depending on the area of the damage. If the affected
finger area is small, the existing fingerprint quality assessment software may fail to
detect it as an altered fingerprint.
2.3PROPOSED SYSTEM:
In Proposed System was evaluated at two levels: finger level and subject
level. At the finger level, we evaluate the performance of distinguishing between
natural and altered fingerprints. At the subject level, we evaluate the performance
of distinguishing between subjects with natural fingerprints and those with altered
fingerprints.
The proposed algorithm based on the features extracted from the orientation
field and minutiae satisfy the three essential requirements for alteration detection
algorithm:
1) Fast operational time,
2) High true positive rate at low false positive rate, and
3) Ease of integration into AFIS.
3. SYSTEM CONFIGURATION
3.1Hardware Specification
3.2Software Specification
OVERVIEW OF JAVA
The main properties of the Java, which made Java so popular, are as
follows:
1. Simple
2. Secure
3. Portable
4. Object-Oriented
5. Robust
6. Multithreaded
7. Architecture-Neutral
8. Interpreted
9. High performance
10.Distributed
11.Dynamic
The most striking feature of the language is that is a platform-neutral
language. Java is first programming language that is not tied to any
particular hardware or operating system. Programs developed in Java can
be executed anywhere on any system.
The key that allows Java to solve both the security and the
portability problems just described is that the output of a Java compiler is
not executable code. Rather, it is Byte code. Byte code is a highly
optimized set of instructions designed to be executed by the Java runtime
systems, which is called the Java Virtual Machine (JVM). That is, in its
standard form, the JVM is an interpreter for Byte code. This may come has
a bit of surprise.
JAVA ENVIRONMENT:
Swings are basically used to create a GUI look i.e. graphical user
interface. A GUI presents a pictorial interface to a program. It allows the
user to spend less time trying to remember which keystroke sequence do
what and spends more time using the program in a productive manner.
The important topics that play a very vital role in swings are as
follows:
JList: A List display a selection of items from which the user may
select one or more items. JList support single-line selection List and
multiple-selection list.
ESTABLISING A CONNECTION
1.Loading the driver: If, we want to use the JDBC-ODBC bridge driver,
the following code will load it :
Class.forName(“sun.jdbc.odbc.JdbcOdbcDriver”);
Our driver documentation will give us the class name to use. For instance,
if the class name is jdbc.Driverxyz, you would load the driver with the
following line of code:
Class.forName(“jdbc.Driverxyz”);
Connection con;
Con=DriverManager.getConnection (url,”scott”,”tiger”);
This step is also simple with the hardest thing being what to
supply for URL. If you are using the JDBC-ODBC Bridge driver, the JDBC
URL will start with jdbc:odbc:. The rest of the URL is generally your data
source name or database system.
CREATING A STATEMENT
Syntax:
Java.sql.Statement st=connection.createStatement();
DATABASE
DATA DICTIONARY
The DBA is the person responsible for the operation, configuration and
performance of the database. The DBA is charged with keeping the database
operating smoothly, ensuring that backups are done on regular basis (and that
backups work), and installing new software. Other responsibilities might include
planning for future expansion and disk space needs, creating databases and table
spaces, adding users and maintaining security, and monitoring the database and
retuning it as necessary. Large installations might have teams of DBA’s to keep the
system running smoothly; alternatively, the task might be segmented among the
DBA’s.
Viewing Data from tables: This is used to view the content’s of the table
created.
Syntax: select * from table_name;
Creating a table from existing table: This is used to create a table from
existing table by taking the columns needed.
Inserting data into a table from another table: This is used to insert rows
from one table into another table.
Delete operation: The verb DELETE in SQL is used to remove all rows
from table, or a selected set of rows from a table.
Syntax: Alter table table_name modify (column_name new datatype (new size));
Destroying tables: This is used to delete any table from the database.
Finding out the tables created by user: To display all the tables which
are there in our database.
4.1Normalization
Normalization is the process of strutting relational database schema such that most
ambiguity is removed. The stage of normalization are referred to as forms and
progress from the least restrictive(first normal form)through the most
restrictive(Fifth normal form), generally , most database designers do not attempt
to implement anything higher then normal form of Boyce code Normal Form.
FIRST NORMAL FORM:
A relation is said to be in First normal form (INF) if and each attributed of
the relation is atomic. More simply, to be INF, each column must contain only a
single value and each now contain in the same column.
Segmentation Enhancement
Fingerprint
Identification
Fingerprint Minutia
Matching Extraction
DATA FLOW DIAGRAM:
Database
Level 0:
User id
Fingerprint images
Fingerprint Features database Enrollment Authentication
Fingerprint database
Level 1
Fingerprint Features
Level 2
Level 2
User
Level 1
fingerprint
Fingerprint Extraction Segmentation
Fingerprint feature DB
User fingerprint
User
fingerprint
Fingerprint database
Level 4
Userid
no
Authentication Determine or verify Match Not match
yes
Fingerprint database
Use case model:
CLASS DIAGRAM
5. SYSTEM DESCRIPTION
Modules:
Fingerprint database
Fingerprint features database
Enrollment Module
Authentication module.
Module Description:
Fingerprint database:
Feature database system retrieves the fingerprint images from the database
and to create the user id for Enrollment module.
Enrollment Module:
Authentication Module:
Testing Objectives:
Testing Principles:
White-box testing:
White box testing focus on the program control structure. Test cases are
derived to ensure that all statements in the program have been executed at least
once during testing and that all logical conditions have been executed.
Block-box testing:
Testing strategies:
A strategy for software testing must accommodate low-level tests that are
necessary to verify that all small source code segment has been correctly
implemented as well as high-level tests that validate major system functions
against customer requirements.
Testing fundamentals:
Testing is a process of executing program with the intent of finding error. A
good test case is one that has high probability of finding an undiscovered error. If
testing is conducted successfully it uncovers the errors in the software. Testing
cannot show the absence of defects, it can only show that software defects present.
Information flow for testing flows the pattern. Two class of input provided
to test the process. The software configuration includes a software requirements
specification, a design specification and source code.
Test configuration includes test plan and test cases and test tools. Tests are
conducted and all the results are evaluated. That is test results are compared with
expected results. When erroneous data are uncovered, an error is implied and
debugging commences.
Unit testing:
Unit testing is essential for the verification of the code produced during the
coding phase and hence the goal is to test the internal logic of the modules. Using
the detailed design description as a guide, important paths are tested to uncover
errors within the boundary of the modules. These tests were carried out during the
programming stage itself. All units of ViennaSQL were successfully tested.
Integration testing:
Integration testing focuses on unit tested modules and build the program
structure that is dictated by the design phase.
System testing:
System testing tests the integration of each module in the system. It also
tests to find discrepancies between the system and its original objective, current
specification and system documentation. The primary concern is the compatibility
of individual modules. Entire system is working properly or not will be tested here,
and specified path ODBC connection will correct or not, and giving output or not
are tested here these verifications and validations are done by giving input values
to the system and by comparing with expected output. Top-down testing
implementing here.
Acceptance Testing:
This testing is done to verify the readiness of the system for the implementation.
Acceptance testing begins when the system is complete. Its purpose is to provide
the end user with the confidence that the system is ready for use. It involves
planning and execution of functional tests, performance tests and stress tests in
order to demonstrate that the implemented system satisfies its requirements.
Test coverage Analyzer – records the control paths followed for each test case.
Timing Analyzer – also called a profiler, reports the time spent in various regions
of the code are areas to concentrate on to improve system performance.
Coding standards – static analyzers and standard checkers are used to inspect code
for deviations from standards and guidelines.
Test Cases:
Test cases are derived to ensure that all statements in the program have been
executed at least once during testing and that all logical conditions have been
executed.
Using White-Box testing methods, the software engineer can drive test cases that
Guarantee that logical decisions on their true and false sides.
Exercise all logical decisions on their true and false sides.
Execute all loops at their boundaries and with in their operational bounds.
Exercise internal data structure to assure their validity.
The test case specification for system testing has to be submitted for review before
system testing commences.
IMPLEMENTATION:
Implementation is the stage where the theoretical design is turned into a
working system. The most crucial stage in achieving a new successful system and
in giving confidence on the new system for the users that it will work efficiently
and effectively.
The system can be implemented only after thorough testing is done and if it is
found to work according to the specification.
It involves careful planning, investigation of the current system and its constraints
on implementation, design of methods to achieve the change over and an
evaluation of change over methods a part from planning. Two major tasks of
preparing the implementation are education and training of the users and testing of
the system.
The more complex the system being implemented, the more involved will be
the systems analysis and design effort required just for implementation.
Initial form
The above screen is the initial of this project ,it shows the all menu available in this project
Admin Login
The above screen is the login page for admin; here you will give authorized input for username
and password after clicking login button
User registration
This page shows new user register fingerprint details into the registration form.
Selecting finger print
After registration user selects their finger print image from the folder.
Registration
After finger print image selection the user enters their details into the finger print registration
form.
This form shows the finger print identification and verification (segmentation) result.
Feature extraction
This form shows the finger print identification and verification (Extraction) result.
Enhancement
This form shows the finger print identification and verification (Enhancement) result.
Finger print check
This page shows enter the finger print details for fingerprint verification.
After finger print verification the form shows the match or no match result. Here the page shows
no match result.
[1] Lin Hong, Yifei Wan and Anil Jain. Fingerprint Image Enhancement:
Algorithm and Performance Evaluation. East Lansing, Michigan.
[2] Fingerprint Minutiae Extraction, Department of Computer Science National
Tsing Hua University Hsinchu, Taiwan 30043
[3] Handbook of Fingerprint Recognition by David Maltoni (Editor), Dario Maio,
Anil K. Jain, Salil Prabhakar
[3] L. Hong, A. Jain, S. Pankanti and R. Bolle, Fingerprint Enhancement, Pattern
Recognition, 202-207, 1996
[4] A. K. Jain, L. Hong, S. Pantanki and R. Bolle, An Identity Authentication
System Using Fingerprints, Proc of the IEEE, vol, 85, no.9,1365-1388, 1997
Sample code:
import java.lang.*;
import java.io.*;
import java.util.*;
public class bruteforcefourway
{
public static void main(String args[ ])
{
String text1,pattern1;
Scanner s=new Scanner(System.in);
System.out.println("\n Enter the text");
text1=s.nextLine();
System.out.println("\n Enter the pattern");
pattern1=s.nextLine();
brute(text1,pattern1);
}
for(i= n/2-m+1;i<=n/2+m-1;i++)// special case searching at the junction where splitting took
place
{
j=0;
while((j<m)&&(pattern.charAt(j)==text.charAt(i + j)))
{
j++;
if (j==m)
{
count++;
System.out.printf("\n %d Match found between %d and %d",count,i-1,i+m);
}
}
}
System.out.printf("\n\n");
System.out.printf("\n Total Matches found are : %d",count);
}
}
String text="1+1=2";
if(text.matches(ptrn)){
System.out.println(text+"\t"+ptrn);
}else{
System.out.println("no match");
}
}
}
retrival = address.matches(regex);
if (retrival) {
msg = "MATCH\npattern:\n " + address + "\nregex is:\n "
+ regex;
}
System.out.println(msg + "\r\n");
return retrival;
}
}
import java.util.regex.*;
import java.io.*;
public class Print_matching_word {