2. Biometrics
Biometrics, is the science of establishing the identity of
a person based on physical or behavioral attributes.
Biometrics involves the different parts of the body,
such as the fingerprint or the eye, as a password or form
of identification .
The word biometrics means biological measurements.
Therefore in this way we can use computers to
recognize person.
3. Modes:-
There are two modes in biometric system:-
1. Verification mode
2. Identification mode
4. Three steps involved in person verification:-
In first step the reference models for all the users are
generated and stored in the model database.
In second step some samples are matched with
reference models to generate the genuine and imposter
scores and calculate the threshold.
The third step is the testing step .This process may use a
smartcard , username or ID number.
5. It performs a one to many comparison against a
biometric database in attempt to establish the identity of
an unknown individual. It is used either for positive or
negative recognisation .
6. What is Fingerprint?
A fingerprint is the pattern of ridges and valleys on the
surface of a fingertip.
The endpoints and crossing points of ridges are called
minutiae. It is a widely accepted assumption that the
minutiae pattern of each finger is unique and does not
change during one's life. Ridge endings are the points
where the ridge curve terminates.
7. What is Fingerprint
recognition?
Fingerprint recognition consists of comparing a print
of the characteristics of a fingertip or a template of
that print with a stored template or print.
8. A fingerprint scanner system has two basic jobs -- it
needs to get an image of your finger, and it needs to
determine whether the pattern of ridges and valleys in
this image matches the pattern of ridges and valleys in
pre-scanned images.
Only specific characteristics, which are unique to every
fingerprint, are filtered and saved as an encrypted
biometric key or mathematical representation. No image
of a fingerprint is ever saved, only a series of numbers (a
binary code), which is used for verification.The algorithm
cannot be reconverted to an image, so no one can
duplicate your fingerprints.
9. Features
A fingerprint consists of the features and details of a
fingertip. There are three major fingerprint features:
Arches: Arches are lines that start on one side of
the print, rise into hills and then exit on the other
side of the print.
Loop: Loops are lines that enter and Exit on the
same side of the print.
Whorl: Whorls are circles that do not exit on either
side of the print.
11. Components Used
Power Supply
LCD
Microcontroller
RTC
Fingerprint Scanner
EEPROM
Switches
12. Power Supply
Power supplies are designed to convert high voltage AC
mains electricity to a suitable low voltage supply for
electronics circuits and other devices. A power supply can
by broken down into a series of blocks.
D2
C1
1000uf
1N4007 +5V
V
LM7805
1 2
3
VIN VOUT
GND
J1
1
2
3
D3
gnd
D4
D1
13. Transformer:-Transformers convert AC electricity from one
voltage to another with little loss of power.Transformers
work only with AC and this is one of the reasons why
mains electricity is AC.
14. Rectifier:-A bridge rectifier can be made using four individual
diodes, but it is also available in special packages containing
the four diodes required. It is called a full-wave rectifier
because it uses all the AC wave (both positive and negative
sections). 1.4V is used up in the bridge rectifier because
each diode uses 0.7V when conducting and there are always
two diodes conducting.
15. Voltage regulator:- ICs are available with fixed (typically 5, 12
and 15V) or variable output voltages.They are also rated by
the maximum current they can pass. Negative voltage
regulators are available, mainly for use in dual supplies
16. Microcontroller
A microcontroller is a programmable logic and
integrated circuit which can be programmed to do a
number of tasks.
It is possible to control just about anything with the
program written by the user.
A microcontroller is meant to be more self-contained and
independent , and functions as a tiny, dedicated
computer.
17. Functions:-
Ability to execute a stored set of instructions to
carry out user defined task.
Ability to access external memory chips to read
and write data from memory.
Ability to interface with the I/O devices.
Features:-
ADCs and DACs
Internal EEPROM
UART for serial communication
19. VCC:-Supply voltage.
GND:-Circuit ground potential.
Port 0:-Port 0 is an 8-bit open-drain bi-directional I/O
port. As an Output port, each pin can sink eightTTL inputs.
In this mode P0 has internal pull-ups. Port 0 also receives
the code bytes during Flash programming, and outputs the
code bytes during program verification. External pull-ups
are required during program verification.
Port 1:- is an 8-bit bi-directional I/O port with internal
pull-ups.The Port 1 output buffers can sink/source fourTTL
inputs. As inputs, Port 1 pins that are externally being
pulled low will source current (IIL) because of the internal
pull-ups.
20. Port 2:-Port 2 is an 8-bit bi-directional I/O port with
internal pull-ups. Port 2 emits the high-order address byte
during fetches from external program memory and during
accesses to external data memory.
Port 3:-Port 3 is an 8-bit bi-directional I/O port with
internal pull-ups . It also serves the functions of various
special features of 8051 family.
RST:- Reset input. A high on this pin for two machine
cycles while the oscillator is running resets the device.
21. ALE/PROG:- Address Latch Enable output pulse for
latching the low byte of the address during accesses to
external memory.This pin is also the program pulse
input (PROG) during programming. It may be used for
external timing or clocking purposes.
PSEN :-Program Store Enable is the read strobe to
external program memory. PSEN is activated twice
each machine cycle.
22. EA/VPP:-When EA is held high the CPU executes out
of internal program memory. Holding EA low forces the
CPU to execute out of external memory regardless of
the Program CounterValue.
XTAL1:-Input to the inverting oscillator amplifier.
XTAL2:-Output from the inverting oscillator
amplifier.
23. LCD
A low-power, flat-panel display used in many
digital devices to display numbers or images. It is
made of a liquid containing crystals that are
affected by electric current, sandwiched
between filtering layers of glass or plastic. LCDs
do not produce light of their own; instead, when
electric current is passed through the material,
the molecules of the liquid crystal twist so that
they either reflect or transmit light from an
external source.
24.
25. EEPROM
These memory devices are used to store the data for
online process.The AT24C64 provides 65,536 bits of
serial electrically erasable and programmable read only
memory (EEPROM) organized as 8192 words of 8 bits
each.The device is optimized for use in many industrial
and commercial applications where low power and low
voltage operation are essential.
26.
27. RTC
A real-time clock (RTC) is a computer clock (most often in
the form of an integrated circuit) that keeps track of the
current time. Although the term often refers to the
devices in personal computers, servers and embedded
systems, RTCs are present in almost any electronic
device which needs to keep accurate time.
28.
29. Fingerprint Scanner
The comparison between the sensed fingerprint image
or template against records in a database or a chip
usually yields a matching score quantifying the similarity
between the two representations. If the score is higher
than a certain threshold, a match is declared, i.e.
belonging to the same finger(s).The decision of a match
or non-match can be automated but it depends also on
whether matching is done for identification or
verification purposes.
30.
31. Application features
and capabilities
Managed by an administrator
Data export
Reports generation
Full control on employee attendance
Fast and simple usage
Several fingers for each user
Notification by e-mail
32. Software Used
Keil:-The Keil 8051 DevelopmentTools are designed to
solve the complex problems facing embedded software
developers.The Keil µVision Debugger accurately
simulates on-chip peripherals (I²C, CAN, UART, SPI,
Interrupts, I/O Ports, A/D Converter, D/A Converter, and
PWM Modules) of your 8051 device.
MATLAB:-MATLAB (matrix laboratory) is a numerical
computing environment and fourth-generation
programming language. Developed by MathWorks,
MATLAB allows matrix manipulations, plotting of
functions and data, implementation of algorithms,
creation of user interfaces, and interfacing with
programs written in other languages, including C, C++
and java.
33. Retina Scan
The human retina is a thin tissue composed of neural
cells that is located in the posterior portion of the eye.
Because of the complex structure of the capillaries that
supply the retina with blood, each person's retina is
unique.The network of blood vessels in the retina is so
complex that even identical twins do not share a similar
pattern.
34. How does it works?
The user looks through a small opening in the device
at a small green light.The user must keep their head
still and eye focused on the light for several seconds
during which time the device will verify his identity.
This process takes about 10 to 15 seconds total.
35. Advantages
Low occurrence of false positives
Extremely low (almost 0%) false negative rates
Highly reliable because no two people have the same
retinal pattern
Speedy results: Identity of the subject is verified very
quickly
36. Disadvantages
Measurement accuracy can be affected by a disease such
as cataracts
Measurement accuracy can also be affected by
severe astigmatism
Scanning procedure is perceived by some as invasive
Not very user friendly
Subject being scanned must be close to the camera
optics
37. Uses
Retinal scanners are typically used for authentication and
identification purposes.
Retinal scanning has been utilized by several government
agencies including the FBI, CIA, and NASA.
Retinal scanning has been used in prisons,
forATM identity verification and the prevention
of welfare fraud.
Retinal scanning also has medical application such
as AIDS, syphilis, malaria, chicken pox and Lyme
disease as well as hereditary
diseases like leukemia, lymphoma, and sickle cell anemia
first impact the eyes.
38. Conclusion
This project mainly comprises of development of
attendance management system and fingerprint
identification system . Attendance management is very
helpful in saving valuable time of students and teachers ,
paper and generating report at required time .This
project presented a framework using which attendance
management can be made automated and online.