Vous êtes sur la page 1sur 8

RESULT

FINGERPRINT RECOGNITION

1. MATLAB
MATLAB features a family of application-specific solutions called toolboxes. Very
important to most users of MATLAB, toolboxes allow you to learn and apply specialized
technology. Toolboxes are comprehensive collections of MATLAB functions (M-files) that
extend the MATLAB environment to solve particular classes of problems.

2. CREATION OF MENU FROM GUI


A GUI ( Graphical User Interface) represents the information and actions available to a
user through graphical icons and visual indicators such as secondary notation, as opposed to
text-based interfaces, typed command labels or text navigation.
3. MENU
Enter the TEXT in text bar i.e Select image and add to database, Select image for
Authentication,Deletedatabase,Visualization,Exit
4. FINGERPRINT CODE
Once the MATLAB is open, the fingerprint code is implemented on the matlab and thus
below is the figure showing the code of fingerprint.

5. FINGERPRINT VISUALIZATION
The image is selected from the database, A database is the place where many images
can be stored and used for the process of Authentication.
6. DISTANCE BETWEEN TWO FINGERPRINT IMAGES
As the two images were added in database, hence now we need to calculate the distance
between two fingerprint images. By using Damn algorithm we calculate the Distance
between two images.
7. AUTHENTICATION SYSTEM
The MENU bar created from the GUI consist of five options which is known as
Fingerprint Authentication System. Below is the figure showing the creation of
Authentication System. After selecting the image from MENU, the fingerprint is added
successfully to database and matched with the other enrolled image showing the
distance zero. As both the images are matched. If the images are not identical the
distance would vary from zero.
SMART ACCESS

1. SHARING OF IMAGE
In all kinds of banking applications, applicant has to sign in application form while
opening an account in the bank. The input image is divided into two shares in which
one share is stored in the bank database, where as another share is given to the
applicant.
2. STACKING
Stacking is a procedure of decoding the original image by overlapping the shares.
Where shares are overlapped together in an aligned order, such that one can see black
sub pixels. The result will be shown in command window. The range of signature
should come nearly to 1, when the two signature matches. If the range is not nearly 1
then it concludes that it is not the sign of the same person.

3. AUTHENTICATION TESTING
Whenever two shares are stacked the resulting image is checked for authentication.
Whenever two shares of different images are overlapped together then an absurd image
will be formed. Thus an attempt to cheat the bank can be overruled. Even though the
shares of different signatures are overlapped an image will be formed which will be
different from the original image, now the resulting image is compared with the original
image. This technique is called correlation, which is used for authentication testing.
If the image is not matched the output will be shown like below.

Vous aimerez peut-être aussi