Professional Documents
Culture Documents
ISSN: 2277-6370
65
Global Journal
ournal of Advanced Engineering Technologies, Vol2, Issue3-2013
Issue3
II. PROPOSED SYSTEM STRUCTURE AND
PROTOTYPE DESIGN
ISSN: 2277-6370
66
Global Journal
ournal of Advanced Engineering Technologies, Vol2, Issue3-2013
Issue3
ISSN: 2277-6370
III.BIOMETRICS
BIOMETRICS
Biometrics is a technology which uses physiological or
behavioural characteristics to identify or verify a person.
Typical characteristics used for authentication include
fingerprint, iris and face. A conventional biometric
authentication system consists of two phases: enrolment and
verification.
During the enrolment phase,
se, a biometric feature set is
extracted from users biometric data and a template is created
and stored. During the verification phase, the same feature
extraction algorithm is applied to query biometric data, and
the resulting query feature set is used to
t construct a query
template. The query template is matched against the stored
template(s) for authentication.
Compared to password/smartcard-based
password/smartcard
Authentication approaches, biometrics-based
biometrics
solutions have
many desired features such as being resistant to losses
incurred by theft of passwords and smartcards, as well as
user-friendliness.. Biometrics bears a users identity and it is
hard to be forged. Unfortunately, brings its own complications:
Security concern: conventional biometric authentication
system record biometric templates in a Central Authentication
Entitys (CAs) database. The stored templates, which
correlate to users biometric data, become potential targets to
be attacked. Some literature [6], [7] has identified the
vulnerabilities caused by the compromise of stored templates.
Privacy concern: Biometrics identifies individuals. To the
best of our knowledge, conventional biometric authentication
system is primarily built upon a fully-trusted
fully
model; that is,
the central authentication entity
ity (CA) is trusted to take full
control of users biometric information and is assumed to not
misuse the information. This assumption of trustworthiness
about the CA is not sufficient in the
Current malicious environments, since handing over ones
biometric
ic information to other parties or loss/compromise of
67
ISSN: 2277-6370
68
Global Journal
ournal of Advanced Engineering Technologies, Vol2, Issue3-2013
Issue3
characteristics include rings, furrows, freckles, and the corona,
to cite only the more familiar.
The density of information such that each iris can be said to
have 266 unique spots as opposed to 13-60
13
for traditional
biometric technologies. This '266' measurement is cited in all
iris recognition literature.; after allowing for the algorithm's
correlative functions and for characteristics inherent to most
human eyes., It has been concluded that 173 "independent
binary degrees-of-freedom"
freedom" can be extracted from his
algorithm - an exceptionally large number for a biometric The
iris image consists of the colour tissue surrounding the pupil.
pupil
ISSN: 2277-6370
the value of the different pixels out of the CCD chip. Read out
the voltages from the CCD-chip.
chip. Thereafter the signals of
each data are amplified and sent to an ADC (Analog to Digital
Converter).
d) GSM technology
Global system for mobile communication (GSM) is a set of
ETSI standards specifying the infrastructure for a digital
service. The standard is used in approx.85 countries in the
world including such locations as Europe, japan, and Australia.
Architecture of the GSM network
A GSM network is composed of several functional entities,
whose functions and interfaces are specified. Figure 1 shows
the layout of a generic GSM network. The GSM network can
be divided in to three broad
oad parts. Subscriber carries the
mobile station. The base station subsystem controls the radio
link with the mobile station. The network subsystem, the main
part of which is the mobile services switching canter (MSC),
performs the switching of calls between
betwe the mobile users, and
between mobile and fixed network users. The MSC also
handles the mobility management operations.
The CCD camera job is to take image from optical system and
convert it into electronic data. Find the iris image by a
monochrome CCD (Charged couple Device) camera transfer
IV.. CONCLUSION
Secured Approach for Authentication System by using
Fingerprint and Iris proves to be very effective in providing
security.
A step by step approach in designing the Secured Approach
for Authentication System by using Fingerprint and Iris giving
security to the users banking system and providing the
security for the locker system using a finger print scanner and
Iris has been followed. The result obtained in providing the
security is quite reliable in all the three modes.
69
ISSN: 2277-6370
Recognition, 1996.
REFERENCES
70