INTRODUCTION
Biometric systems have overtime served as robust
security mechanisms in various domains. Fingerprints are the oldest and most
widely used form of biometric identification. The use of fingerprint for
identification has been employed in law enforcement for about a century. A much
broader application of fingerprint is for personal authentication, for instance
to access a computer,a network, an ATM machine, a car or a home. Electronic
lock using fingerprint recognition system is a process of verifying the
fingerprint image to open the electronic lock. This project highlights the
development of fingerprint verification. Verification is completed by comparing
the data of authorized fingerprint image with incoming fingerprint image. Then
the information of incoming fingerprint image will undergo the comparison
process to compare with authorized fingerprint image . Access control is a
fundamental issue of any security system, and it is mainly devoted to checking the
truthfulness users’ claimed identity, in order to both verify personal access
rights and support tracing and logging services. Access control implies
authorization, and it strongly relies on identity analysis and authentication.
Within a company structure, the requirements and rules that prespreside over
access control may differ with respect to different locations, expected
actions, and fand functions principals. Moreover, they can vary over time. The
main focus of this paper isis authentication I.e., the process of confirming
the identity of an entity), and its deployment in areal context within a
company security system where it should be responsible for regulating thethe
maincess and the transit to the different zones inside the company itself. Authentication
involves the verification of the validity of at least one form of
identification (e.g.,documents, digital certificate, biometric identifiers,
etc.). The most interesting approach for identity assessment falls into the
category “checking something that the user is or does†as the factors of
authentication, known as inherence factors. Examples of inherence factors are
static ordynamic Biometric parameters like face, fingerprint, iris, retinal
pattern, signature, voice, etc.
Get the Complete Project Material Now!!!