CONSTRUCTION A FINGERPRINT ACCESS CONTROL SYSTEM,CHM

DepartmentComputer Science/Engineering

Amount₦5,000.00

INTRODUCTION Biometric systems have overtime served as robust security mechanisms in various domains. Fingerprints are the oldest and most widely used form of biometric identification. The use of fingerprint for identification has been employed in law enforcement for about a century. A much broader application of fingerprint is for personal authentication, for instance to access a computer,a network, an ATM machine, a car or a home. Electronic lock using fingerprint recognition system is a process of verifying the fingerprint image to open the electronic lock. This project highlights the development of fingerprint verification. Verification is completed by comparing the data of authorized fingerprint image with incoming fingerprint image. Then the information of incoming fingerprint image will undergo the comparison process to compare with authorized fingerprint image . Access control is a fundamental issue of any security system, and it is mainly devoted to checking the truthfulness users’ claimed identity, in order to both verify personal access rights and support tracing and logging services. Access control implies authorization, and it strongly relies on identity analysis and authentication. Within a company structure, the requirements and rules that prespreside over access control may differ with respect to different locations, expected actions, and fand functions principals. Moreover, they can vary over time. The main focus of this paper isis authentication I.e., the process of confirming the identity of an entity), and its deployment in areal context within a company security system where it should be responsible for regulating thethe maincess and the transit to the different zones inside the company itself. Authentication involves the verification of the validity of at least one form of identification (e.g.,documents, digital certificate, biometric identifiers, etc.). The most interesting approach for identity assessment falls into the category “checking something that the user is or does” as the factors of authentication, known as inherence factors. Examples of inherence factors are static ordynamic Biometric parameters like face, fingerprint, iris, retinal pattern, signature, voice, etc.




Get the Complete Project Material Now!!!

Contact Us On

We Offer The Following Services To Researchers All Over The World:. Sourcing Of Data,Analysis Of Data,Interpretation , Download Over 50,000 Project materials.We are the best when it comes to research materials, data analysis using:E-view, SPSS etc.
Call : 09068888164
Make An Appointment