Presentation is loading. Please wait.

Presentation is loading. Please wait.

Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.

Similar presentations


Presentation on theme: "Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System."— Presentation transcript:

1 Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System

2

3 Common Usage of Biometric Systems Border Control Border Control Criminal Investigation Criminal Investigation Access control Access control Attendance control Attendance control Customer relationship management (CRM) Customer relationship management (CRM) PC biometrical logon PC biometrical logon Identity verification Identity verification Banking Banking Secure Web Transactions Secure Web Transactions

4 Fingerprint identification Human fingerprints are unique to each person and can be regarded as a sort of signature, certifying the person's identity. Because no two fingerprints are exactly alike, the process of identifying a fingerprint involves comparing the ridges and impressions on one fingerprint to those of another. Human fingerprints are unique to each person and can be regarded as a sort of signature, certifying the person's identity. Because no two fingerprints are exactly alike, the process of identifying a fingerprint involves comparing the ridges and impressions on one fingerprint to those of another. This first involves capturing the likeness of the fingerprint, either through use of a fingerprint scanner (which takes a digital picture of a live fingerprint), scanning a pre-existing paper-based fingerprint image or by pulling what is known as a "latent fingerprint" from a crime scene or other place of investigation, from which a digital image is created. This first involves capturing the likeness of the fingerprint, either through use of a fingerprint scanner (which takes a digital picture of a live fingerprint), scanning a pre-existing paper-based fingerprint image or by pulling what is known as a "latent fingerprint" from a crime scene or other place of investigation, from which a digital image is created. Once the fingerprint image is captured, the process of identification involves the use of complex algorithms (mathematical equations) to compare the specific features of that fingerprint to the specific features of one or more fingerprint images that have been previously stored in a database. Once the fingerprint image is captured, the process of identification involves the use of complex algorithms (mathematical equations) to compare the specific features of that fingerprint to the specific features of one or more fingerprint images that have been previously stored in a database.

5 Facial Identification Like fingerprint biometrics, facial recognition technology is widely used various systems, including physical access control and computer user accounts security. Like fingerprint biometrics, facial recognition technology is widely used various systems, including physical access control and computer user accounts security. Usually these systems extract certain features from face images and then perform face matching using these features. A face does not have as many uniquely measurable features as fingerprints and eye irises, so facial recognition reliability is slightly lower than these other biometrical recognition methods. However, it is still suitable for many applications, especially when taking into account its convenience for user. Facial recognition can also be used together with fingerprint recognition or another biometrical method for developing more security-critical applications. Usually these systems extract certain features from face images and then perform face matching using these features. A face does not have as many uniquely measurable features as fingerprints and eye irises, so facial recognition reliability is slightly lower than these other biometrical recognition methods. However, it is still suitable for many applications, especially when taking into account its convenience for user. Facial recognition can also be used together with fingerprint recognition or another biometrical method for developing more security-critical applications. Using face identification as an additional biometric method can dramatically decrease this effect. This multi-biometrical approach also helps in situations where a certain biometric feature is not optimal for certain groups of users. For example, people who do heavy labor with their hands may have rough fingerprints, which can increase the false rejection rate if fingerprint identification was used alone. Using face identification as an additional biometric method can dramatically decrease this effect. This multi-biometrical approach also helps in situations where a certain biometric feature is not optimal for certain groups of users. For example, people who do heavy labor with their hands may have rough fingerprints, which can increase the false rejection rate if fingerprint identification was used alone.

6 Proposed System using Advance Biometrics Our systems consists of three modules 1. Transactions record with finger Identification ( FIR Registration ) 2. Staff Attendance using finger Identification 3. Criminal AFIS using multi biometrics ( Finger and facial Identification)

7 FIR Registration 1. Complete Computerize FIR system with Optional Urdu Interface. 2. Each FIR record the finger print of Lodger and Staff. 3. Every update on particular FIR will be updated regularly. 4. Detail Audit and Performance reporting on each case.

8 Personnel System Compile staff personal file Compile staff personal file Educational and other details Educational and other details Secure Staff Attendance with finger identification Secure Staff Attendance with finger identification No Buddy Punching No Buddy Punching Staff Movement record Staff Movement record Duty Roaster and shift details Duty Roaster and shift details

9 Criminal AFIS Tracking of Different Criminals with Jails Tracking of Different Criminals with Jails Finger and Facial Print database using Finger and Facial Print database using forensic quality scanners. forensic quality scanners. Criminal Identification from Finger and Facial biometrics Complete track database of each person.

10 Hardware and Software Required Windows OS based latest server and desktop machines Windows OS based latest server and desktop machines Rational Database ( Ms SQL Server or Oracle ) Rational Database ( Ms SQL Server or Oracle ) NIST and MITEX approved Finger Scanner NIST and MITEX approved Finger Scanner Digital Camera Digital Camera Normal Laser Printer Normal Laser Printer Customize AFIS and Personnel System Customize AFIS and Personnel System

11 Some Common Finger Scanner and digital Cameras Some Common Finger Scanner and digital Cameras

12 Task Achieved with the system A complete FIR management System A complete FIR management System A complete Personnel system with attendance features A complete Personnel system with attendance features Access of Criminal record with Finger and facial matching and verification technology Access of Criminal record with Finger and facial matching and verification technology Access of every data within few key stokes Access of every data within few key stokes Customize reports for performance and audit monitoring. Customize reports for performance and audit monitoring.

13 Future Enhancements AFIS for police and civilian applications (ANSI/NIST) AFIS for police and civilian applications (ANSI/NIST) Rolled and Flat Finger and full Palm scanning. Rolled and Flat Finger and full Palm scanning. Crime scene scanning Crime scene scanning Iris Scanning Iris Scanning Police database with tenprints (TP) and latent prints (LP) Police database with tenprints (TP) and latent prints (LP) Includes TP-TP, TP-LP, LP-TP, LP-LP searching Includes TP-TP, TP-LP, LP-TP, LP-LP searching Integration of digital photos and signatures Integration of digital photos and signatures Mobile Handheld units for field operation with database matching with Central over GSM Mobile Handheld units for field operation with database matching with Central over GSM Exchange of database within different region or countries. Exchange of database within different region or countries.

14 Thank You for your Time and Patience Thank You for your Time and Patience


Download ppt "Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System."

Similar presentations


Ads by Google