410 likes | 618 Views
FINGERPRINT IDENTIFICATION SYSTEM. SUPERVISORS : Mr. Huynh Anh Dung Mr. Nguyen Tat Trung STUDENTS: Nguyen Thanh Long Nguyen Ky Thanh Duong Quynh Hoang Thi Minh Sau. I. INTRODUCTION. Nguyen Thanh Long. Nguyen Ky Thanh. Duong Quynh. Hoang Thi Minh Sau.
E N D
FINGERPRINT IDENTIFICATION SYSTEM SUPERVISORS:Mr. Huynh Anh Dung Mr. Nguyen Tat Trung STUDENTS: Nguyen Thanh Long Nguyen Ky Thanh Duong Quynh Hoang Thi Minh Sau
I. INTRODUCTION Nguyen Thanh Long Nguyen Ky Thanh Duong Quynh Hoang Thi Minh Sau
I. INTRODUCTION Mr. Huynh Anh Dung Mr. Nguyen Tat Trung Nguyen Thanh Long Nguyen KyThanh • http://canhchimviet.info/fingerprint • Email: [URGENT], [@name], etc. • Offline at the library and home Hoang Thi Minh Sau Duong Quynh
FINGERPRINT IDENTIFICATION SYSTEM • Explosion of information technology • We want to create a product with the cheaper cost • Our passion about the biometrics
CONTENT IV. SOFTWARE DESIGN DESCRIPTION III. REQUIREMENT SPECIFICATION II. SOFTWARE PROJECT PLAN I. INTRODUCTION V. SOFTWARE TESTING
I. INTRODUCTION 1. About the fingerprint 2. Literature review 3. Proposal • Fingerprint formed in the mother's uterus will exist forever through human life. • Each person owns a different fingerprint
I. INTRODUCTION 1. Background 2. Literature review 3. Proposal • Quality Induced Fingerprint Identification using Extended Feature Set introduced by Vatsa, M.; Singh, R.; Noore, A.; Singh, S.K. (2008) • Jin, A.L.H.; Chekima, A.; Dargham, J.A. and Liau Chung Fan introduce a paper named Fingerprint identification and recognition using back-propagation neural network (2002) • In “Image Processing, 2000. Proceedings. 2000 International Conference”, Huvanandana, S.; Changick Kim and Jenq-Neng Hwang introduces a paper named Reliable and fast fingerprint identification for security applications
I. INTRODUCTION 3. Proposal 2. Literature review 1. Background • Existing systems still remain many limitations • 1900 incorrect results in fingerprint identification procedures (According to statistics of the U.S. departments of biological identity) • Error rate of fingerprint analysis is 0.8% (FBI)
I. INTRODUCTION 3. Proposal
II. SOFTWARE PROJECT PLAN • Scope • Research and apply algorithms of image processing and matching for fingerprint identification • Inputted image : 256x256 size in different formats as .png, .gif, .jpg and .bmp 1. Project Scope and Organization 2. Project Management Plan
II. SOFTWARE PROJECT PLAN 1. Project Scope and Organization 2. Project Management Plan
II. SOFTWARE PROJECT PLAN 1. Project Scope and Organization 2. Project Management Plan • Development environment FI Algorithm FI Application - Windows XP, Vista, 7 - .Net Framework 4.0 Microsoft SQL Server 2008
II. SOFTWARE PROJECT PLAN 2. Project Management Plan 1. Project Scope and Organization • Tools and Techniques • C# programming language / Microsoft Visual Studio 2010 on .NET framework 4.0 • ReSharper 5.0 • Jude community 5.4
II. SOFTWARE PROJECT PLAN 1. Project Scope and Organization 2. Project Management Plan
III. REQUIREMENT SPECIFICATION • FI Algorithm: • Allow users to input 256x256 size fingerprints image with different quality characteristics but only in format files: JPG, GIF, BMP, PNG • The system also allows the user to test the algorithms of image processing that assures the sequence: • Normalization Enhancement Representing in binary Thinned Ridge Show Details • Enable / disable rule • Allow the users to compare two fingerprint images. • Allows the user to search the fingerprint inputted. 1. User requirement specification
III. REQUIREMENT SPECIFICATION • Additional requirements of FI Algorithm (Project success criteria): • The processing time of each function of image processing should be about 2 seconds • The result of comparing two images is processed less than 5 seconds • Time processing of searching the input fingerprints in the fingerprint database is less than 10 seconds • With 5 couples of fingerprint image pattern of same fingerprints, the system just returns to 1 error couple 1. User requirement specification
III. REQUIREMENT SPECIFICATION • FI Application • Allows the staffs in companies to get their information from inputted fingerprint. • Allows the administrator to make a report the working time, insert and update user information • Allows the government agencies to search the fingerprint 1. User requirement specification
III. REQUIREMENT SPECIFICATION • Additional requirements of FI Application (Project success criteria) • The search function should be processed less than 5 seconds. • The getting, updating user information and report generating function should be less than 5 seconds. 1. User requirement specification
III. REQUIREMENT SPECIFICATION • Additionally common requirements • User-friendly interface • The system should guarantee completely all criterion and function about safety, reliability, usability, efficiency requirements, etc. 1. User requirement specification
III. REQUIREMENT SPECIFICATION 1. User requirement specification 2. System requirement specification
III. REQUIREMENT SPECIFICATION 1. User requirement specification 2. System requirement specification 3. Entity Relationship Diagram
IV. DESIGN DESCRIPTION Idea of algorithms Image processing • Normalization • Enhancement • Representation in binary • Thinning ridges • Show details Input image Extracted features
IV. DESIGN DESCRIPTION Image normalization
IV. DESIGN DESCRIPTION Thinning ridges of the image
IV. DESIGN DESCRIPTION Minutiae extraction
IV. DESIGN DESCRIPTION Fingerprint comparison
IV. DESIGN DESCRIPTION Fingerprint comparison
IV. DESIGN DESCRIPTION Class and sequence diagram FI Algorithm Class diagram for fingerprint comparison Class diagram for image processing
V. TESTING 1. Features to be tested 2. Features not to be tested 3. Checklists • FI Algorithm • All functionalities related to image processing • Comparing two fingerprint images • Searching and identifying an input fingerprint image
V. TESTING 1. Features to be tested 2. Features not to be tested 3. Checklists • FI Application • Getting user information • Searching user information • Reporting working time • Updating new user information
V. TESTING 1. Features to be tested 2. Features not to be tested 3. Checklists • FI Algorithm • Opening fingerprint image file • Graphic user interface • FI Application • Report format • Sensor initialization and activation • Graphic user interface
V. TESTING 1. Features to be tested 2. Features not to be tested 3. Checklists • All things listed in 2. Features not to be tested. • Checklist with project success criteria
FUTURE PLAN • Using algorithms associated with some other features to improve and increase quality of inputted images • Artificial neural network to increase the accuracy of identification • Global citizen profile bank