1 / 41

SUPERVISORS : Mr. Huynh Anh Dung Mr. Nguyen Tat Trung STUDENTS: Nguyen Thanh Long

FINGERPRINT IDENTIFICATION SYSTEM. SUPERVISORS : Mr. Huynh Anh Dung Mr. Nguyen Tat Trung STUDENTS: Nguyen Thanh Long Nguyen Ky Thanh Duong Quynh Hoang Thi Minh Sau. I. INTRODUCTION. Nguyen Thanh Long. Nguyen Ky Thanh. Duong Quynh. Hoang Thi Minh Sau.

shawn
Download Presentation

SUPERVISORS : Mr. Huynh Anh Dung Mr. Nguyen Tat Trung STUDENTS: Nguyen Thanh Long

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. FINGERPRINT IDENTIFICATION SYSTEM SUPERVISORS:Mr. Huynh Anh Dung Mr. Nguyen Tat Trung STUDENTS: Nguyen Thanh Long Nguyen Ky Thanh Duong Quynh Hoang Thi Minh Sau

  2. I. INTRODUCTION Nguyen Thanh Long Nguyen Ky Thanh Duong Quynh Hoang Thi Minh Sau

  3. I. INTRODUCTION Mr. Huynh Anh Dung Mr. Nguyen Tat Trung Nguyen Thanh Long Nguyen KyThanh • http://canhchimviet.info/fingerprint • Email: [URGENT], [@name], etc. • Offline at the library and home Hoang Thi Minh Sau Duong Quynh

  4. FINGERPRINT IDENTIFICATION SYSTEM • Explosion of information technology • We want to create a product with the cheaper cost • Our passion about the biometrics

  5. CONTENT IV. SOFTWARE DESIGN DESCRIPTION III. REQUIREMENT SPECIFICATION II. SOFTWARE PROJECT PLAN I. INTRODUCTION V. SOFTWARE TESTING

  6. I. INTRODUCTION 1. About the fingerprint 2. Literature review 3. Proposal • Fingerprint formed in the mother's uterus will exist forever through human life.  • Each person owns a different fingerprint

  7. I. INTRODUCTION 1. Background 2. Literature review 3. Proposal • Quality Induced Fingerprint Identification using Extended Feature Set introduced by Vatsa, M.; Singh, R.; Noore, A.; Singh, S.K. (2008) • Jin, A.L.H.; Chekima, A.; Dargham, J.A. and Liau Chung Fan introduce a paper named Fingerprint identification and recognition using back-propagation neural network (2002) • In “Image Processing, 2000. Proceedings. 2000 International Conference”, Huvanandana, S.; Changick Kim and Jenq-Neng Hwang introduces a paper named Reliable and fast fingerprint identification for security applications

  8. I. INTRODUCTION 3. Proposal 2. Literature review 1. Background • Existing systems still remain many limitations • 1900 incorrect results in fingerprint identification procedures (According to statistics of the U.S. departments of biological identity) • Error rate of fingerprint analysis is 0.8% (FBI)

  9. I. INTRODUCTION 3. Proposal

  10. II. SOFTWARE PROJECT PLAN • Scope • Research and apply algorithms of image processing and matching for fingerprint identification • Inputted image : 256x256 size in different formats as .png, .gif, .jpg and .bmp 1. Project Scope and Organization 2. Project Management Plan

  11. II. SOFTWARE PROJECT PLAN 1. Project Scope and Organization 2. Project Management Plan

  12. II. SOFTWARE PROJECT PLAN 1. Project Scope and Organization 2. Project Management Plan • Development environment FI Algorithm FI Application - Windows XP, Vista, 7 - .Net Framework 4.0 Microsoft SQL Server 2008

  13. II. SOFTWARE PROJECT PLAN 2. Project Management Plan 1. Project Scope and Organization • Tools and Techniques • C# programming language / Microsoft Visual Studio 2010 on .NET framework 4.0 • ReSharper 5.0 • Jude community 5.4

  14. II. SOFTWARE PROJECT PLAN 1. Project Scope and Organization 2. Project Management Plan

  15. III. REQUIREMENT SPECIFICATION • FI Algorithm: • Allow users to input 256x256 size fingerprints image with different quality characteristics but only in format files: JPG, GIF, BMP, PNG • The system also allows the user to test the algorithms of image processing that assures the sequence: • Normalization  Enhancement  Representing in binary  Thinned Ridge  Show Details • Enable / disable rule • Allow the users to compare two fingerprint images. • Allows the user to search the fingerprint inputted. 1. User requirement specification

  16. III. REQUIREMENT SPECIFICATION • Additional requirements of FI Algorithm (Project success criteria): • The processing time of each function of image processing should be about 2 seconds • The result of comparing two images is processed less than 5 seconds • Time processing of searching the input fingerprints in the fingerprint database is less than 10 seconds • With 5 couples of fingerprint image pattern of same fingerprints, the system just returns to 1 error couple 1. User requirement specification

  17. III. REQUIREMENT SPECIFICATION • FI Application • Allows the staffs in companies to get their information from inputted fingerprint. • Allows the administrator to make a report the working time, insert and update user information • Allows the government agencies to search the fingerprint 1. User requirement specification

  18. III. REQUIREMENT SPECIFICATION • Additional requirements of FI Application (Project success criteria) • The search function should be processed less than 5 seconds. • The getting, updating user information and report generating function should be less than 5 seconds. 1. User requirement specification

  19. III. REQUIREMENT SPECIFICATION • Additionally common requirements • User-friendly interface • The system should guarantee completely all criterion and function about safety, reliability, usability, efficiency requirements, etc. 1. User requirement specification

  20. III. REQUIREMENT SPECIFICATION 1. User requirement specification 2. System requirement specification

  21. III. REQUIREMENT SPECIFICATION 1. User requirement specification 2. System requirement specification 3. Entity Relationship Diagram

  22. IV. DESIGN DESCRIPTION

  23. IV. DESIGN DESCRIPTION

  24. IV. DESIGN DESCRIPTION Idea of algorithms Image processing • Normalization • Enhancement • Representation in binary • Thinning ridges • Show details Input image Extracted features

  25. IV. DESIGN DESCRIPTION Image normalization

  26. IV. DESIGN DESCRIPTION Thinning ridges of the image

  27. IV. DESIGN DESCRIPTION Minutiae extraction

  28. IV. DESIGN DESCRIPTION Fingerprint comparison

  29. IV. DESIGN DESCRIPTION Fingerprint comparison

  30. IV. DESIGN DESCRIPTION Class and sequence diagram FI Algorithm Class diagram for fingerprint comparison Class diagram for image processing

  31. V. TESTING 1. Features to be tested 2. Features not to be tested 3. Checklists • FI Algorithm • All functionalities related to image processing • Comparing two fingerprint images • Searching and identifying an input fingerprint image

  32. V. TESTING 1. Features to be tested 2. Features not to be tested 3. Checklists • FI Application • Getting user information • Searching user information • Reporting working time • Updating new user information

  33. V. TESTING 1. Features to be tested 2. Features not to be tested 3. Checklists • FI Algorithm • Opening fingerprint image file • Graphic user interface • FI Application • Report format • Sensor initialization and activation • Graphic user interface

  34. V. TESTING 1. Features to be tested 2. Features not to be tested 3. Checklists • All things listed in 2. Features not to be tested. • Checklist with project success criteria

  35. V. TESTING

  36. DEMO

  37. FUTURE PLAN • Using algorithms associated with some other features to improve and increase quality of inputted images • Artificial neural network to increase the accuracy of identification • Global citizen profile bank

  38. THANK YOU FOR LISTENING

More Related