Design and Implementation Biometric Access Control System Using Fingerprint for Restricted Area Base

Design and Implementation Biometric Access Control System Using Fingerprint for Restricted Area Based on Gabor Filter

Ashraf El-Sisi
Computer Science Department, Faculty of Computers and Information, Menofyia University, Egypt
 
Abstract: Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for automatically computerized recognition systems. Fingerprints are the most widely used form of biometric recognition system successfully. However, fingerprint images are rarely of perfect quality. They may be degraded and corrupted due to variations in skin and impression conditions. Thus, image enhancement techniques are employed prior to minutiae extraction to obtain a more reliable estimation of minutiae locations. Minutiae extraction yielded many minutiae resulting from fingerprint irregularities. The aim of this work is the development of a biometric access control system for restricted areas based on individual finger print and Gabor filter for enhancement process. The development system architecture, demonstrating the components, enhancement, minutiae extraction and matching techniques are presented. A software application is written in Matlab and C# to implement algorithms for enhancement, minutiae extraction and matching processing. The resulting minutiae information will be used as a method of identifying matching fingerprints. Also it will be used to register this fingerprint in system database. Finally, verification system, and identification system are implemented. Registration system has facilities namely; automatic registration, manual registration and update for the database to help the administrator to update required information. Based on that processing, an integrated secure system for biometric access control is developed for restricted area with acceptable security level.

Keywords: Biometric, fingerprint, enhancement, gabor filter, minutiae extraction, verification, and identification system.

  Received November 6, 2008; accepted May 17, 2009

  

Full Text

Read 4148 times Last modified on Wednesday, 13 July 2011 08:29
Share
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…