I am greatly indebted to Dr. Yang Xue “B.sc., Msc, PhD, AFSRPSoc MInstP CPhys Csci Senior IEEE ” for assisting me with this project and for valuable input in the organising Project, Constant Encouragement, Consistent Guidance.
I express my sincere thanks to our Module Leader, Prof. Dr. Karim Ouzzane for being a great pillar to support me for all achievements.
I would like to thank Shelly Ahmed ‘CCTM subject Librarian’ for guiding me library resources and subject guide tutorials for this project.
Existing security measures basically depends on the knowledge based approaches like passwords, tokens based approaches used in swipe cards and passports to control physical and virtual spaces. As very common such type of methods are not very secure as cards can be stolen and shared. Moreover, they cannot be differentiating between authorized user and the person having access to the tokens and passwords. There are so many Biometric techniques in this modern world i.e. DNA recognition, face recognition, voice recognition and fingerprint recognition. Fingerprint matching is one of the most famous and unique biometric technique uses to get the main Authentication of users and to store data about people. Fingerprint based identification is the oldest method which is used in so many applications because of every individual is known to be have unique fingerprints . The uniqueness of a fingerprint can be determined by the pattern of the ridges and furrows as well as the minutia points . Fingerprint images are rarely of perfect quality, thus in order to filter images we need to pass image many filters. Reliable extraction of the fingerprint image features and original prints of the furrows and ridges are very challenging problem. There are so many algorithms used for the fingerprint feature extractions and enhancements like co-relation based algorithm, point match based algorithm, phase -correlation algorithm, minutiae matching algorithm and many more. This Research emphasises on diverse emerging fingerprint image comparison techniques. In addition to comparison, this application deduce about the number of angle matched in both print images. A study has been conducted on various soft wares which are associated with the image comparison and fingerprint matching. Neverthless various previously researched software comprises certain limitations in matching fingerprint images and calculating minutiae and angle of orientation. A designed interface is built in order to enable to user to understand and perform matching of the images. This research did not contradict previous researchers; most of my research based on previous researchers theory and previous studies.
If you need assistance with writing your essay, our professional essay writing service is here to help!Essay Writing Service
The aim of the proposed research study is to develop fingerprint matching software which would compare two fingerprint images taken by ordinary paper scanner and enable user to know whether the both fingerprint images are matched or non-matched. This software also calculate the angle of orientation and let the user know how many percentage of angle values matched with the other second image and how many minutiae values matched with the second image.
More than a century has passed, when “Alphonse Bertillon” conceived and then industriously practiced the idea of using body measurements for solving crimes. As his idea was gaining popularity  it faded into relative obscurity because of the far most significant and practical discovery of the uniqueness of the human fingerprint . Soon after this discovery many major law departments and researchers embraced the idea of the “booking of the fingerprints” for the criminal records, so that their fingerprints are readily available when they need to verify with the leftover prints on the crime scene, and the identity of the criminal can be determined. These agencies sponsored a rigorous study of the fingerprints and developed scientific methods for the visual matching of the fingerprints and strong programming and cultures for the training fingerprint experts, and applied to the art of fingerprint identification for nailing down the perpetrators.
Despite of the ingenious methods improvised to increase the efficiency of the manual of fingerprints indexing and search, the ever-growing demands on manual fingerprint identification quickly became overwhelming. The manual method of fingerprint indexing resulted in a highly skewed distribution of fingerprints into bins. The most fingerprints fells into a few bins and this resulted in search inefficiencies.
Most recently, increasing identity frauds has created a growing need for “biometric technology” for positive person identification in a number of non-forensic applications. There are so many questions in “Public and Government sectors” commonly are
- Is this person authorised to enter this facility.
- Is this individual entitled to access the privileged information?
- Is this given service being administered exclusively to the enrolled user?
To answer these types of questions non-forensic organisations was forced to use fingerprint identification systems. Because biometric systems cannot be easily misplaced, forged or shared. They are more reliable for personal identification then token and password based methods .
The objective of these applications are user convenience (e.g. Money withdrawal without ATM card and PIN), better security (e.g. difficult to forge access), and more efficiency (e.g. lower overhead of computer password access and maintenance).
Fingerprint Based systems Offer several advantages over traditional security measure. These are:
1. Non- Repudiation:-
With tokens and Password based approaches, the perpetrator can always deny committing the crime that his /her password or Id was stolen and compromised even when confronted with an electronic audit trial. There is no way in which his claim can be verified effectively. This type of problems is known as Problem of deniability or of ‘Repudiation’.
While biometric (Fingerprint) is indefinitely associated with user and hence it cannot be lent or stolen making such repudiation infeasible.
2. Accuracy and security:
Password based systems are prone to dictionary and brute force attacks. Moreover such systems are as venerable as their weakest password. On the other hand, fingerprint systems require physical presence of the User, therefore cannot be circumvented through a dictionary and brute force style attack. Biometric have also been shown to posses a higher bit strength compared to password based systems  and are therefore inherently secure.
In screening applications, systems are used to prevent User from assuming multiple identities (e.g. using multiple driving licences and Bank accounts). This requires ensuring that a person has not already enrolled under another assumed identity. Such screening is not possible using traditional authentication mechanisms and fingerprint or biometric systems provide the only available option.
A fingerprint is comprised of ridges and valleys. The fingerprint images are represented by global and local features. The global features include the ridge orientation, ridge spacing and singular points known as core and delta. The singular points are very useful from the classifications perspective .The ridges are dark areas of the fingerprints and the valleys are the White area that exists between the ridges and the valleys, as shown in the in the fingerprint image.
The point where a ridge terminate and the point where a single ridge split into two ridges are called “Ridge Ending” and “ Bifurcation” points respectively. A ridge which is shorter than the average ridge length on fingerprint is called “Island (Dot)”. There are so many points and patterns in fingerprint like “core”, “crossover” etc.
These all points are also known as Minutiae of the fingerprint. The Most commonly used minutiae in fingerprint recognition technologies are “Ridge Endings” and “Bifurcation”, because they can be easily detected by only looking at points that surround them. Minutiae and patterns are very important in the analysis of the fingerprint, as no two different fingerprints shown to be identical. Minutiae based “Fingerprint Matching System ”usually returns the number of matched minutiae on both query and reference fingerprints and uses it to generate similarity scores. Mostly, more matched minutiae generate higher scores. That is when the number of minutiae on both fingerprints are large we can find the impostor fingerprint using the number of minutiae .
Objectives of the proposed study:-
The objective of this study is to study and design and implementation of the ‘Fingerprint Image Matching’. The idea of the project is to study and design of the “USE CASES”, “flow charts”, “sequence diagrams”, “class diagrams”, “charts” and implementation of GUI Model.
Theoretically study of fingerprint matching system’s functions.
- Working of Desktop based fingerprint matching system.
- Working and study of the Image processing Algorithms and Filters.
- To read JPEG scanned images and there related colour values.
- To study about different fingerprint matching techniques and filters to develop code for the project.
- To develop a simple user interface for fingerprints that gives accurate output.
- To Implementation of the real time based tool.
Assumptions and Constraints:-
- The source code is developed in the java environment.
- The main aim of the study is to compare two fingerprint images and calculate angle of orientation values.
- Database is not needed for this project.
- Matching can be done only after uploading both images.
- There is no saving function as saving function is not needed for this tool.
Functional requirements Of the Study:
This project’s primarily specification is to develop software related to the research study on fingerprint matching. Only the software has to be developed for this research. This project is developed by individual with the help and in the guidance of the one appointed supervisor by the University. There is no other involvement in the development of this software. There are various types of resources needs to meet the requirements of the project, which are used for the design and implementation of the project.
1 Hardware Resource:
- Computer System.
- 1 GB hard Disk space.
- 256 MB RAM.
- A scanner to scan images.
The computing lab of London Metropolitan University is well equipped lab with all the facilities required for the environment of study and provides all the Hardware resources and tools which are required for this project. A separate USB pen drive is used to regularly back up the data.
2. Software needs:
- JAVA platform JDK 1.2, which support the robust in build java platform virtual machine.
- J creator LE, software for the environment of the java language platform.
- MS Office 2007, Concept draw office Project management Software, for documentation and Diagram Drawing.
These facilities are provided by the University’s well equipped computer lab and meet all the need for the project.
3. People :
This people involved in the project for teaching and the guideline is:
- Project Supervisor/Faculty Member : Dr. Yang Xue.
No hardware is developed for this system.
The online automatic fingerprint recognition system is very accurate and large system in existing applications. It has an interface the enables the user to verify and identify the related data from the data base with the help of the fingerprint images. This system interface called fingerprint matching system is build a user friendly approach and hence do not find it cumbersome to work on it. ISO quality standards are maintained while developing the software and the interface is associated quite strongly with the quality requirements mentioned in ISO standards. Interface has File, Open and exit Menu option. It also has One text are and one button option to match both fingerprint images and display the result in the text area.
Functional requirements are defined as specific functions, tasks or behaviour the system must support. In term of ISO quality characteristics for evaluation the functional requirements address the quality characteristics of functionality. A functional requirement outlines the needs of the application. 
Functional requirements for the fingerprint matching applications are:-
- The software should be very friendly and should give accurate and quick result.
- User can select fingerprint image from the system. The interface should have a browsing screen so that the user can select file form the various images.
- The selected image should be saved to system memory and keep save the original file till the result is displayed.
- Matching two similar fingerprint images and two different images.
- The user when compare two images, if both are similar it should display a message both images are matched otherwise display both images are not matched.
- The software should have exit button to stop the process.
Non functional requirements:
Non functional requirements are usually some from of constraint or restriction that must be considered when designing the solution. Non functional requirements tend to identify user constraints and system constraints..
The image comparison software should be user friendly and easy to understand. Interface should be comfortable so that it will be easy for the user to operate. The tool must be intuitive or easily understood after the tutorials and user guide. Display should be presentable.
The software should be designed in such a way that any future modifications or improvisation can be done with much more functionality.
The project must be efficient such that it can select image and display in scaled manner within the GUI. Software should provide reliable result.
The system should be able to run on any platform. This project runs on windows 98/2000/ XP/vista operating system. It should have java virtual machine (JVM) in the operating system and Xinox Software Jcreator LE.
The fingerprint matching software should enable user to understand whether the software are suitable. The software should be understandable and easy for user to know more about fingerprint matching and make further development in future..
In current global and competitive environment, information technology plays an important role which results in automation and time saving. There are many types of software which perform fingerprint identification, verification and matching. The main problem in this kind of application is that complexity factor is involved. The interfaces designed in those applications, are very complex and contain highly sophisticated code.
There is no prior software available that incorporates the feature of matching within the JVM environment, and they keep in standard size in the GUI which looks not impressive. Each time a user wants to match two fingerprint images of his choice, each time the source code would have to be modified. So the Developer should have to care about all these problems and understand the software and user needs.
Patterns of Study:-
This study is organised in the four Chapters to manage each and every part of the process step by step and organise the functions and research in an organised manner. Here shows the chapters and the work done, explained in the chapters.
A. Chapter 1:
Chapter 1, discuss about the basic designing of the project is reviewed and describe about the step by step designing of the project. In this chapter the literature parts shows the study done for the designing and the first step for the understanding and analysis of the project. A study of basic proposed Architecture basic functions of Architectures are discussed for the understanding and working of the project.
B. Chapter 2:
Chapter 2 describe about the various present algorithms, pattern Recognitions and feature extractions of the fingerprint image. These chapters review about filters and the working of the filters.
C. Chapter 3:
Chapter 3 describes about the implementation part of the project and describe about the code used in the implementation. It describes the working pattern of the coding and analysis the basic understanding of the coding.
D. Chapter 4:
Chapter 4, reviews about the testing part of the project and discuss the screen shots of the project taken while testing. It also describes the problems phased during testing and proposed solutions. More it describe about the errors and bugs which will cause the problem while transferring to new proposed system.
1. Project Plan:
The project has been assigned on the 10 February, 2010. The overall project will be completed till the 4 June 2010. A project plan was drawn on the 2nd week of the Feb. 2010 and worked with the help of Gantt chart to aid smooth project management. The development process of the project is identified as follows:
- Study of existing real world application (like smartcard finger match etc.)For understanding the background and real world working of the application.
- Identify the key area of the concentration and study of the project, moreover needs and environment for the project. A project plan and management chart for better process.
- Study the various algorithms and popularity with in the real world applications and study the main functioning of the algorithms and about the problems faced by them in the past.
- Risk analysis and ethical issues and project proposal report.
- Designing the prototyping methods and Model Building for the look and outer design of the method.
- Implementation of the design and compare with the other application and reviews with the other application.
- Testing the project and making correction according to the needs while facing problems.
- Documentation and Report writing.
The Gantt chart shows about the project plan made for the development and implementation of the project. This specifies resources also who meets the needs of the project.
The schedule of the project is based on this schedule summary of the research study. The schedule of the project is based on the work breakdown structure of the study and pattern of the study. We can measure cost and timing of the project completion. The work breakdown structure is hierarchical chart that represent the tasks, sub tasks and deliverables. This structure is been illustrated in the detail in the Gantt chart. Gantt chart is developed with the help of “Concept Draw office project” (Business and Management Software).
Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.View our services
As I discussed above this chapter discuss the basic designing process of the software and reviews about the step involved in the project management and development. This section encompasses the explanation of the diagrams that exhibits the flow of the data between classes, methods and attributes. Fingerprint matching software is designed to develop user friendly software that provides result very efficiently.
1 Literature Survey:
Large study but reviews specific literature was done for basic ‘Use case’ designing of the projects which are focused on the project needs.
- Bruegge, Dutoit , explained about the software designing about UML diagrams, about Use cases and structure and step to step configuration of the software. This books review the main concepts and about the structural process of the software and about how to flow from one step to another. .
- Springer, Jose ,  provides details of software management process and methodology of software. A bridge between the real world and the process of project introduced with the help of survey based techniques. The focus is on supporting the development of explicit models and deploying automated support environment. An analysis of core technologies and basic concepts underpinning software process modelling and software process automation, with a special emphasis on the mechanism supported by software evolution are summarised.
- Ray turner , , detailed about the methodologies used while in software processing and reviews about the structure charts, functional specification, testing steps.
- Andrew, jeniffer , , briefly explains about the life cycles of software project, tools and support. It also discusses the ISO 9000 based eight core principles. Project design maintenance and programming controls are reviewed by this book.
- Deitel, Deitel & sentry , provide the full functioning knowledgeable tutorials about programming in java classes. It also discusses the coding platform requirements and about libraries
- Evelyn Stiller and Cathie leblanc, , details about the development step which are used for software construction under the Conceptualisation view of the system and real world requirements. Moreover functional and non functional requirements can be analysed with the help of this study. It discusses the paradigm and product design key concepts between real world situation with the help of class design and product design process. Evelyn and Cathie, discussed designing and management in parallel views for better results.
The system’s general architecture consists of components of fingerprint matching software. This general overview explains the interaction between the User and the Interface. This is representing in the form of simple diagram.
After analysing the above architecture and working of the system, a working architecture with the method and the classes is drawn, that process the internal working of the system. As per this architecture, initially user loads two images to the image buffer, on which all the operations are performed, such as averaging, filtering and matching.
From this architecture user upload both images to the buffer one by one in the parallel frame and all the operation work in parallel one after second image and provide result.
According to the propose architecture User load both raw images taken by normal scanner and shows both to the main frame in parallel way. Enhance the image with the help of Average method of images to reduce the noise and after that binaries the image in the form of 0 and 1 according to the resolution and intensity of the image. Calculate the angle of orientation through Gabor filter method and extract the features of the both image. With the help of these features, they both features are compared to one by one and calculate the match percentage of the features.
Main Window Design:
The above screen shot is the main window of the fingerprint matching system. This frame appears when we execute the main fingerprint matching software. This window is called the main window known as GUI of the application. This window helps the user to communicate with the application friendly manner and helps for processing all the available options.
Interface is built in a presentable approach for the user to easily understand the software. It enables the user to perform fingerprint comparison in order to obtain calculated result by the application.
The fingerprint matching interface of the application consists of File, open and Exit options. This software consists of one button called “MATCH_BUTTON” and one text area which shows all the information about image calculations.
There is only one menu option in this software, which further consists of 2 submenu options. File menu consists of two submenus, OPEN and EXIT.
When user select the OPEN menu a small window appear with the option of File chooser window. File chooser window aids the user to choose the file from desired location. The image should be JPEG image. The purpose of this menu item is to select any image to the interface. The OPEN item works for two times. To select second image to whom User going to Compare user need to press OPEN item again and can load second image without any error. Therefore one item works twice without any obstruct.
By pressing the EXIT item the application is closed.
When user load images and perform any action information related to the image is shown in the text area. Like when user load 1st image it shows ‘image 1 is loaded’.
The function of the button is to do all the calculation after it pressed.
When user clicks the button, the application performs all the calculations and applies filters and calculate angle, compare both image data and produce result in the form of dialog box.
Mind Map Diagram:
The mind map diagram maps most of related study with the application and the related results. The mind map depicts the related areas and mapping of the mind to concentrate all the related areas of the study. It link all the application related issues and sector of study, problems, selection of the techniques and steps for the future work.
Flow chart Diagram:
The flow chart diagram depicts the main flow of the application. It shows the background functionality and the processing of the application according to filters and shows the overview of the working.
Overview of UML:
UML stand for Unified Modeling Language. UML has evolved from the work of ‘GRADY BOOCH’,‘JAMES RUMBAUGH’, IVAR JACOBSON and the relational Software Corporation. This renewed computer scientist fused their respective technologies into a single, standardized model. The Object Management Group (OMG) accepted UML as the standard for Modeling object oriented programs.
Unified Modeling Language is a standard language that has been designed for the System’s development visualisation, documenting and specifying the requirements of the process. .
Types of UML Diagrams:
UML basically define nine types of Diagrams:
- Use case Diagram.
- Class (Package) Diagram.
- Sequence Diagram.
- Collaboration Diagram.
- State Chart Diagram.
- Object Diagram.
- Activity Diagrams.
- Deployment Diagram.
- Component Diagram.
Use Case Diagram:
A use case diagram describes a sequence of actions that provide something of measurable value to an actor and is drawn as a horizontal ellipse. 
Class diagram describe the relationship between classes. It represents the fundamental architecture of the system. This diagram contains the methods and the attributes of the particular class. Attributes are the information stored about an object.
Sequence diagrams describe interactions among classes in terms of an exchange of messages over time. 
Collaboration diagrams represent interactions between objects as a series of sequenced messages. Collaboration diagrams describe both the static structures and the dynamic behaviour of a system. 
State Chart Diagrams:-
State chart diagrams describe the dynamic behaviour of an application in response to external stimuli. State chart diagrams are especially useful in modelling reactive objects whose states are triggered by specific events. .
An object diagram describes the static structure of a system at a particular time. They can be used to test class diagram for accuracy, relationship between the instances and reflect about the multiplicity and roles of the classes. Object diagram uses a subset of the class diagram’s elements. We can draw an object diagram to illustrate a real life example of a class and its attributes relationship. 
Activity diagram illustrate the dynamic nature of a system by modelling the flow of control from activity to activity and display all the sequences of the activities. Activity diagrams are used to explain all the situations about parallel processing of some activities in the execution time. They represent an operation on some class in the system and about the system’s change in resulting operations. This type of diagrams is used to model business process, internal operations and workflow of the system.
Deployment diagram shows the physical resources in a system, the configuration of the hardware elements (node), software elements, connections and artifacts are mapped onto those nodes. .
Component Diagrams depicts the organisation of physical software components, run-time (binary) code, Source code and executables.
Use Case Diagram for Fingerprint matching system:-
The use case diagram in this application shows the working pattern of the application. According to this Use case, the user run the application and uploads both raw images to the application. Application stores both images to the JVM memory and process the both images paralally. After running the application shows the main Window to upload raw images taken by Hp normal scanner. Images are taken by normal scanner are considered as normal images, while all the process is done by the application.
As according to the pattern of study this section of the research discuss about the fingerprint patterns, feature extraction algorithms, filters and the algorithm and filter used in the application.
Fingerprints and pattern Recognition:-
Fingerprint is not a separate field. It evolved through interaction and influence of several fields. Fingerprint matching emerged from the recognition of the pattern recognition to forensics. While fingerprints are primarily considered as application of pattern recognition techniques, it has several outstanding differences from conventional classification problems as enumerated below:
- In conventional pattern classification problems such as ‘Optical character Recognition’ (OCR) recognition, the number of pattern to classify is small compared to the number of pattern with the available fingerprint. Moreover it is very common that only single type of data is generated for each image.
- The primary task in fingerprint Matching is that of choosing a
Cite This Work
To export a reference to this article please select a referencing stye below:
Related ServicesView all
DMCA / Removal Request
If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: