Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Preventing Mobility Device Intrusion and Information Theft Using Biometric Fingerprint Recognition


Affiliations
1 K.S. Rangasamy College of Technology, Tiruchengode, India
     

   Subscribe/Renew Journal


Fingerprint based authentication system project is used to more secured your system compare to all other security device which uses biometric reader. In the project data from the finger print is send to the system through port and fingerprint reader is used to read the data from port and validate the data with your data. If the validation output success then the user would be allowed else it blocks the user to allow. The system have to use third party component to read or send the data through the serial port. In the project implementation you have to enter your data (user id and password) after register finger print, so data for the validation could be catch directly from finger print through the serial port. After read the data from serial port using third party component in biometric database FVC2004, it checks whether the entered by the user and reading data’s are match or not. After your successful validation (match) you can move ahead for further works else you can’t. In an existing system we secure the system through check whether the user id and password match with data’s in database or not, but it’s possible to steal the data from the database. So it’s not highly secured so go for the implementation of fingerprint based authentication system project. Fingerprint based authentication system project is more secured compare to all other securities, because you can’t stole any user information due to high security. Information stored in fingerprint is only known by the user so even through unknown person uses the fingerprint they can’t enter the correct data while we checking. If the third person uses fake finger print to access the system, which is also recognized and block the user to use. Finally we conclude no way to steal the user’s data and we can maintain the user’s information safely and securely, so fingerprint based authentication system is more secured compare to all other security device or system.


Keywords

Biometric Database, User Identification, Security, Fingerprint, Matching.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 134

PDF Views: 3




  • Preventing Mobility Device Intrusion and Information Theft Using Biometric Fingerprint Recognition

Abstract Views: 134  |  PDF Views: 3

Authors

P. Vidhya Gandhi
K.S. Rangasamy College of Technology, Tiruchengode, India
M. Vanitha
K.S. Rangasamy College of Technology, Tiruchengode, India
S. Rajkumar
K.S. Rangasamy College of Technology, Tiruchengode, India

Abstract


Fingerprint based authentication system project is used to more secured your system compare to all other security device which uses biometric reader. In the project data from the finger print is send to the system through port and fingerprint reader is used to read the data from port and validate the data with your data. If the validation output success then the user would be allowed else it blocks the user to allow. The system have to use third party component to read or send the data through the serial port. In the project implementation you have to enter your data (user id and password) after register finger print, so data for the validation could be catch directly from finger print through the serial port. After read the data from serial port using third party component in biometric database FVC2004, it checks whether the entered by the user and reading data’s are match or not. After your successful validation (match) you can move ahead for further works else you can’t. In an existing system we secure the system through check whether the user id and password match with data’s in database or not, but it’s possible to steal the data from the database. So it’s not highly secured so go for the implementation of fingerprint based authentication system project. Fingerprint based authentication system project is more secured compare to all other securities, because you can’t stole any user information due to high security. Information stored in fingerprint is only known by the user so even through unknown person uses the fingerprint they can’t enter the correct data while we checking. If the third person uses fake finger print to access the system, which is also recognized and block the user to use. Finally we conclude no way to steal the user’s data and we can maintain the user’s information safely and securely, so fingerprint based authentication system is more secured compare to all other security device or system.


Keywords


Biometric Database, User Identification, Security, Fingerprint, Matching.