FINGERPRINT BASED IGNITION SYSTEM 01.docx

download FINGERPRINT BASED IGNITION SYSTEM  01.docx

of 30

Transcript of FINGERPRINT BASED IGNITION SYSTEM 01.docx

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    1/30

    FINGERPRINT BASED IGNITION SYSTEM

    1.1 Introduction

    Biometric systems have overtime served as robust security mechanisms in various

    domains. Fingerprints are the oldest and most widely used form of biometric identification. A

    critical step in exploring its advantages is to adopt it for use as a form of security in already

    existing systems, such as vehicles.

    This research work focuses on the use of fingerprints for vehicle ignition, as opposed to

    the conventional method of using keys. The prototype system could be divided into the following

    modules: fingerprint analysis software module that accepts finger prints images hardware

    interface module and the ignition system module. The fingerprint recognition software enablesfingerprints of valid users of the vehicle to be enrolled in a database. Before any user can ignite

    the vehicle, his!her fingerprint image is matched against the fingerprints in the database while

    users with no match in the database are prevented from igniting the vehicle. "ontrol for the

    ignition system of the vehicle is achieved by sending appropriate signals to the parallel port of

    the computer andsubse#uently to the interface control circuit.

    The developed prototype serves as an impetus to drive future research, gearedtowards

    developing a more robust and embedded real$time fingerprint based ignitionsystems in

    vehicles.Biometrics refers to the automatic identification of a living person based on

    physiological or behavioural characteristics for authentication purpose. Among the existing

    biometric.

    Biometric technology is used for automatic personal recognition based on biological

    traits%fingerprint, iris, Face, palm print, hand geometry, vascular pattern, voice%or behavioral

    characteristics%gait, signature,typing pattern. Fingerprinting is the oldest of these methods and

    has been utili&ed for over a century by law enforcement officials who use these distinctive

    characteristics to keep track of criminals.

    The 'ational (cience and Technology "ouncil provides the following overview of biometric

    system components: )A typical biometric system is comprised of five integrated components: A sensor is

    used to collect the data and convert the information to a digital format. (ignal processing algorithms

    perform #uality control activities and develop the biometric template. A data storage component keeps

    information that new biometric templates will be compared to. A matching algorithm compares the new

    1

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    2/30

    biometric template to one or more templates kept in data storage. Finally, a decision process *either

    automated or human$assisted+ uses the results from the matching component to make a system$level

    decision.

    Biometric method re#uires the physical presence of the person to be identified. This

    emphasi&es its preference over the traditional method of identifying -what you have such as, the

    use of password, a smartcard etc. Also, it potentially prevents unauthori&ed admittance to access

    control systems or fraudulent use of AT/s, Time 0 Attendance (ystems, cellular phones, smart

    cards, desktop 1"s, 2orkstations , vehicles and computer networks. Biometric recognition

    systems offer greater security and convenience than traditional methods of personal recognition.

    Fingerprint recognition represents the oldest method of biometric identification which is

    dated back to 3344 B". The use of fingerprints as a personal code has a long tradition and was

    already used by the Assyrians, the Babylonians, the "hinese and the 5apanese .All human beings have uni#ue, immutable fingerprints. A fingerprint is made of a series

    of ridges and furrows!valleys on the surface of the finger. The uni#ueness of a fingerprint can be

    determined by the pattern of ridges and furrows as well as the minutiae points. /inutiae points

    are local ridge characteristics that occur at either a ridge bifurcation or a ridge ending .

    Fingerprint images are rarely of perfect #uality. They may be degraded and corrupted with

    elements of noise due to many factors including variations in skin and impression conditions.

    This degradation can result in a significant number of spurious minutiae being created and

    genuine minutiae being ignored. Thus, it is necessary to employ image enhancement techni#ues

    prior to minutiae extraction to obtain a more reliable estimate of minutiae locations.

    The prices of fingerprint recognition systems compared to other biometric systems are

    #uite low and the user acceptance is very high. The strength of fingerprint identification is that it

    can be deployed in a varied range of environments. Also, it is a proven core technology and, the

    ability of enrolling multiple fingers can increase the system accuracy and the flexibility

    dramatically .

    There are several concerns surrounding the use of biometrics for identification. 6f a credit

    card or key is lost or stolen, the card can be cancelled, the locks can be changed and replaced.

    7owever, if biometric data is compromised, there are a finite number of replacements, as a

    person has only 84 fingers, two eyes, etc. Another concern is the possibility that sensors which

    re#uire contact could be unsanitary. 9nsuring the privacy and security of biometric data is also of

    2

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    3/30

    concern, as users will be unlikely to accept the technology if information could potentially be

    tampered with, stolen or otherwise misused.

    There is a present demand for robust security systems in vehicles. Therefore, the

    usefulness of designing and implementing a biometric security system using fingerprint

    technology, to prevent unauthori&ed vehicle ignition cannot be overemphasi&ed.

    VISION & VIABILITY

    3

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    4/30

    Biometrics has been touted as the answer to our security authentication. 7owever, 6ve

    shown hole after hole in this security )solution. Thisdoesnt mean biometrics should be tossed

    out like day$old doughnuts. )5ust as a firewall does not constitute a network security solution but

    rather a component ofa defensive strategy, biometrics could be viewed in the same manner.

    Today,auto thieves dont try to get your car key and make a duplicate, they ;ust try to bypassthe

    alarm and ignition system to get the car started. 6n the same way,biometrics cant be viewed as a

    cure$all for authentication security problems. 2eneed to have security defense in depth.

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    5/30

    strengthens a systems audit trail, and forces imposters tocreate data that looks like a

    biometric sample to the naked eye as well asto an extraction algorithm.

    '(in) muti*# %iom#tric(. /ultiple biometric authentication is oftenproposed as a

    means of solving the liveness problem, as it is clearly much more difficult to spoof two

    biometrics in tandem or in se#uence than tospoof one. 7owever, implementing multiple

    biometrics is currently muchmore difficult than it seems. 1rocess flows for verification

    are generally notcompatible with the provision of more than one biometric

    characteristic,due to environmental, cost, or e#uipment limitations. 6n

    certainenvironments, multiple biometric implementations can be deployedeffectively

    however, it is not the cure$all that it would seem to be at firstglance.

    '(in) muti+!actor aut,#ntication. ltimately, the use of multi$factorauthentication $

    using biometrics with smart cards, tokens, evenpasswords $ reduces the convenience

    provided by biometric systems butreduces the likelihood of biometric systems being

    spoofed. An imposterwould need both the token and!or the secret along with imposter

    data inorder to defeat the system. 6n certain biometric systems C identificationsystems, for

    example $ this is not viable

    5

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    6/30

    TE-NOLOGY RE/'IREMENT 0ARDARE2

    3.1 FINGER RE-OGNITION DEVI-E

    2hen a user places their finger on '6T>9's Fingerprint @ecognition Device

    *F@D+ for the first time, the fingerprint is scanned and a E$D fingerprint image is captured. All

    fingerprints contain a number of uni#ue physical characteristics called minutiae, which includes

    certain visible aspects of fingerprints such as ridges, ridge endings, and bifurcation *forking+ of

    ridges. /ost of the minutiae are found in the core points of fingerprints, and the core points

    themselves are found near the centre of the fingerprint on the fleshy pad. Figure shows the

    positions of core points within fingerprints.

    6

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    7/30

    The user is enrolled, or registered, in the database after a special minutiae$based

    algorithm extracts key minutiae points from the live image at the time of ac#uisition andconverts the data into a uni#ue mathematical template comparable to a 4$digit password. This

    uni#ue template is then encrypted and stored C it is important to note that no actual image of the

    fingerprint is stored, only the minutiae$based template. The next time a new fingerprint image for

    an individual is scanned by the F@D, another template is created and the two templates are

    compared to verify the users identity.

    7

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    8/30

    3.4 I)nition S5(t#m( o! V#,ic#(

    The ignition system of an internal$combustion engine is an important part of the overall

    engine systemthat provides for the timely burning of the fuel mixture within the engine. All

    conventional petrol*gasoline+ engines re#uire an ignition system. The ignition system is usually

    switched on!off through alock switch, operated with a key or code patch.The ignition system

    works in perfect concert with therest of the engine of a vehicle. The goal is to ignite the fuel at

    exactly the right time so that theexpanding gases can do the maximum amount of work that in

    line with the processes to make thevehicle move. 6f the ignition system fires at the wrong time,

    power will fall and gas consumption andemissions can increase .

    The part of the ignition system that first initiates the process of moving a vehicle is the

    keysystem in con;unction with the kick starter. A wire from the battery in the vehicle connects to

    the kickstarter and other wires connect the kick starter to the key system. 2hen the car key in the

    ignitionsystem is turned once, two wires coming from the kick starter to the key system are

    bridged. Thiscauses the engine and some other parts of the vehicle to be put in a @9AD or

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    9/30

    The disadvantage of the mechanical system is the use of breaker points to interrupt the

    low$voltage high$current through the primary winding of the coil the points are sub;ect to

    mechanical wear where they ride the cam to open and shut, as well as oxidation and burning at

    the contact surfaces from the constant sparking. They re#uire regular ad;ustment to compensate

    for wear, and the opening of the contact breakers, which is responsible for spark timing, is

    sub;ect to mechanical variations.

    6n addition, the spark voltage is also dependent on contact effectiveness, and poor

    sparking can lead to lower engine efficiency. A mechanical contact breaker system cannot control

    an average ignition current of more than about E A while still giving a reasonable service life,

    and this may limit the power of the spark and ultimate engine speed.

    9lectronic ignition *96+ solves these problems. 6n the initial systems, points were still

    used but they handled only a low current which was used to control the high primary current

    through a solid state switching system. (oon, however, even these contact breaker points were

    replaced by an angularsensorof some kind $ either optical, where a vaned rotor breaks a light

    beam, or more commonly using a 7all effect sensor, which responds to a rotating magnet

    mounted on the distributor shaft. The sensor output is shaped and processed by suitable circuitry,

    then used to trigger a switching device such as a thyristor, which switches a large current through

    the coil.

    The first electronic ignition *a cold cathodetype+ was tested in 8JKI by Delco$@emy,

    while Lucasintroduced a transistori&edignition in 8JMM, which was used on B@/and "oventry

    "limaxFormula

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    10/30

    9arl 2. /eyerat "hrysler worked on 96, continuing until 8J8 and resulting in use of 96

    on the companys'A("A@hemisin 8JE and 8JK.

    1rest$/ in 8JHM.

    6n 8JH, 1rest$eneral /otors, the 7ot$(park electronic

    ignition conversion kit and the aforementioned "hrysler$built electronic ignition system.

    10

    http://en.wikipedia.org/w/index.php?title=Earl_W._Meyer&action=edit&redlink=1http://en.wikipedia.org/wiki/NASCARhttp://en.wikipedia.org/wiki/NASCARhttp://en.wikipedia.org/wiki/Chrysler_Hemi_engine#Hemi_design_reintroducedhttp://en.wikipedia.org/wiki/Prest-O-Litehttp://en.wikipedia.org/w/index.php?title=Capacitance_discharge&action=edit&redlink=1http://en.wikipedia.org/wiki/American_Motorshttp://en.wikipedia.org/wiki/American_Motorshttp://en.wikipedia.org/wiki/Oldsmobilehttp://en.wikipedia.org/wiki/GMC_(automobile)http://en.wikipedia.org/wiki/GMC_(automobile)http://en.wikipedia.org/wiki/Motorolahttp://en.wikipedia.org/wiki/Fiat_Dinohttp://en.wikipedia.org/wiki/Fiat_Dinohttp://en.wikipedia.org/wiki/Dodgehttp://en.wikipedia.org/wiki/Plymouth_(automobile)http://en.wikipedia.org/w/index.php?title=Super_Stock&action=edit&redlink=1http://en.wikipedia.org/wiki/Dodge_Coronethttp://en.wikipedia.org/wiki/Plymouth_Belvederehttp://en.wikipedia.org/wiki/Drag_racinghttp://en.wikipedia.org/w/index.php?title=Breakerless_ignition&action=edit&redlink=1http://en.wikipedia.org/wiki/Chrysler_LA_engine#340_V8http://en.wikipedia.org/wiki/Chrysler_Hemi_engine#Hemi_design_reintroducedhttp://en.wikipedia.org/wiki/Carburetorhttp://en.wikipedia.org/wiki/Carburetorhttp://en.wikipedia.org/wiki/Retrofithttp://en.wikipedia.org/wiki/High_energy_ignitionhttp://en.wikipedia.org/wiki/General_Motorshttp://en.wikipedia.org/wiki/General_Motorshttp://en.wikipedia.org/w/index.php?title=Earl_W._Meyer&action=edit&redlink=1http://en.wikipedia.org/wiki/NASCARhttp://en.wikipedia.org/wiki/Chrysler_Hemi_engine#Hemi_design_reintroducedhttp://en.wikipedia.org/wiki/Prest-O-Litehttp://en.wikipedia.org/w/index.php?title=Capacitance_discharge&action=edit&redlink=1http://en.wikipedia.org/wiki/American_Motorshttp://en.wikipedia.org/wiki/Oldsmobilehttp://en.wikipedia.org/wiki/GMC_(automobile)http://en.wikipedia.org/wiki/Motorolahttp://en.wikipedia.org/wiki/Fiat_Dinohttp://en.wikipedia.org/wiki/Dodgehttp://en.wikipedia.org/wiki/Plymouth_(automobile)http://en.wikipedia.org/w/index.php?title=Super_Stock&action=edit&redlink=1http://en.wikipedia.org/wiki/Dodge_Coronethttp://en.wikipedia.org/wiki/Plymouth_Belvederehttp://en.wikipedia.org/wiki/Drag_racinghttp://en.wikipedia.org/w/index.php?title=Breakerless_ignition&action=edit&redlink=1http://en.wikipedia.org/wiki/Chrysler_LA_engine#340_V8http://en.wikipedia.org/wiki/Chrysler_Hemi_engine#Hemi_design_reintroducedhttp://en.wikipedia.org/wiki/Carburetorhttp://en.wikipedia.org/wiki/Retrofithttp://en.wikipedia.org/wiki/High_energy_ignitionhttp://en.wikipedia.org/wiki/General_Motors
  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    11/30

    3.3 Micro+-ontro#r

    A microcontro#r *sometimes abbreviated 6-, u-or M-'+ is a smallcomputeron a

    single integrated circuit containing a processor core, memory, and

    1rogrammable input!outputperipherals. 1rogram memory in the form of '

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    12/30

    converter*AD"+, Digital to Analog converter*DA"+, everything integrated onto a single silicon

    chip. Depending on the need and area of application for which it is designed, the chip on features

    present in it may or may not include all the individual sections.

    6n their pro;ect use Atmel ATIJ(M8 eight bit microcontroller with Kk bytes in system

    programmable flash. The ATIJ(M8 is a low power, high performance "/

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    13/30

    EEPROMstands for ElectricallyErasable Programmable Read$Only Memory and is a

    type of non$volatile memoryused in computers and other electronic devices to store small

    amounts of data that must be saved when power is removed, e.g., calibration tables or device

    configuration.

    nlike bytes in most other kinds of non$volatile memory, individual bytes in a traditional

    991@

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    14/30

    /ost common serial interface types are (16,6P", /icrowire,'6!

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    15/30

    Parallel bus devices

    1arallel 991@

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    16/30

    AT47-84 is an electrically erasable and programmable @

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    17/30

    to base of the R8 transistors, the transistor is conducting and shorts the collector and emitter

    terminal and &ero signals is given to base of the R3 transistor. (o the relay is turned

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    18/30

    TE-NOLOGY RE/'IREMENT 0SOFTARE2

    6n order to ensure a fair comparison of various fingerprint recognition algorithms,

    acommon evaluation framework has to be defined. 6n this section a reference systemthat can be

    used as a baseline for future improvements and comparisons is firstdefined. The database and the

    corresponding protocols are then described along withthe associated performance measures. The

    benchmarking experiments presented inthis section can be easily reproduced using the material

    and relevant informationprovided on the companion site

    7.1 NFIS4

    The reference system for the fingerprint modality in the Bio(ecure 'etwork of 9xcellence is

    the minutiae$based '6(T Fingerprint 6mage (oftware *'F6(3Crel.3IC3.3+ . 'F6(3 contains

    software technology, developed for the Federal Bureauof 6nvestigation *FB6+, designed to

    facilitate and support the automated manipulationand processing of fingerprint images. (ource

    code for over M4 different utilitiesor packages and an extensive sers >uide are distributed on

    "D$@

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    19/30

    /6'DT"T takes a fingerprint image and locates all minutiae in the image, assigningto

    each minutia point its location, orientation, type, and #uality. The architecture of/6'DT"T is

    shown in Fig

    System architecture of the MINDTCT package of the NIST FingerprintImage

    Software2 (NFIS2)

    it can be divided in the following phases: a+ generation of image #uality map b+

    binari&ation c+ minutiae detection d+ removalof false minutiae *including islands, lakes, holes,

    minutiae in regions of poor image#uality, side minutiae, hooks, overlaps,minutiae that are too

    wide,and minutiae thatare too narrow$pores+ e+ counting of ridges between a minutia point and

    its nearest neighbours andf + minutiae #uality assessment. Additional details of these phasesare

    given below.

    Because of the variation of image #uality within a fingerprint,'F6(3 analy&es the image

    and determines areas that are degraded. (everal characteristics are measured,including regions of

    low contrast, incoherent ridge flow, and high curvature. Thesethree conditions represent unstable

    areas in the image where minutiae detection isunreliable, and together they are used to represent

    levels of #uality in the image.An image #uality map is generated integrating these three

    19

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    20/30

    characteristics. 6mages are divided into non overlapping blocks, where one out of five levels of

    #uality is assigned to each block.

    The minutiae detection step scans the binary image of the fingerprint, identifying local

    pixel patterns that indicate the ending or splitting of a ridge. A set of minutiapatterns is used to

    detect candidate minutia points. (ubse#uently, false minutiaeare removed and the remaining

    candidates are considered as the true minutiae ofthe image. Fingerprint minutiae marchers often

    use other information in additionto ;ust the points themselves. Apart from minutias position,

    direction, and type,/6'DT"T computes ridge counts between a minutia point and each of its

    nearestneighbours.

    6n the last step, a #uality!reliability measure is associated with each detected minutia

    point. 9ven after performing the removal step, false minutiae potentially remain in the list. A

    robust #uality measure can help to manage this. Two factors are combined to produce a #uality

    measure for each detected minutia point. The first factor is taken directly from the location of the

    minutia point within the #ualitymap described before. The second factor is based on simple pixel

    intensity statistics*mean and standard deviation+ within the immediate neighbourhood of the

    minutia point.A high #uality region within a fingerprint image is expected to have

    significantcontrast that will cover the full grayscale spectrum

    7.3 BO

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    21/30

    and the intervening line between both minutiae. A comparison table is constructed for each of the

    two fingerprints.

    The next step is to take the 6ntraFingerprint /inutia "omparison Tables from thetwo

    fingerprints and look for )compatible entries between the two tables. Table entriesare

    )compatible if: a+ the corresponding distances and b+ the relative minutia angles are within a

    specified tolerance. An 6nterFingerprint "ompatibility Table is generated, only including entries

    that are compatible. A compatibility table entrytherefore incorporates two pairs of minutia, one

    pair from the template fingerprint and one pair from the test fingerprint. Theentry into the

    compatibility table indicatesthat the minutiae pair of the template fingerprint corresponds to the

    minutiaepair of the test fingerprint.

    At the end of the second step, we have constructed a compatibility table that consists of a

    list of compatibility associations between two pairs of potentially corresponding minutiae. These

    associations represent single links in a compatibility graph. The matching algorithm then

    traverses and links table entries into clusters,combining compatible clusters and accumulating a

    match score. The larger the number of linked compatibility associations, the higher the match

    score, and the more likely the two fingerprints originate from the same person.

    21

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    22/30

    TE-NOLOGY DESIGN

    9.1 Int#r!acin) t,rou), t,# P- Para# Port

    9xternal devices *hardware+ can be controlled through the 1" parallel port. This is known

    as hardwareinterfacing. 6t enables communication between a designed hardware and a digital

    computer. The modesof communication and the system operation are controlled by a program or

    codes that are resident onthe digital computer.The parallel port is a simple and inexpensive tool

    for building computer controlled devices andpro;ects. 6t is often used in computer controlled

    robots, Atmel!16" programmers, home automation etc.

    The primary use of a parallel port is to connect printers to computers but many other

    types of hardwarefor that port is available today. Thus it is often called the printer port or

    centronics port *after a popular printer manufacturing company -centronics who devised some

    standards for the parallel port+

    The parallel port connector is located in the rear panel of a 1". 6t is a 3Mpin D$shaped

    *DB3M+ female connector to which the printer or other devices may be connected. 'ot all3M pins

    are needed always. sually only I output pins *data lines+ and signal ground are used. Theparallel port data pins are TTL outputs, that can both sink and source current. 6n ordinary parallel

    port implementations the data outputs are HKL(EHK 6" totem$pole TTL outputs which can source

    3./aand sink 3KmA *9ngdahl, 344M+.

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    23/30

    connected internally to theData, "ontrol and (tatus registers internally. By manipulating these

    registers in program, the parallelport can easily be read to or written from with programming

    languages like Delphi, Gisual basic, "," and BA(6". The word connection does not mean that

    there is some physical connection betweendata!control!status lines. The registers are virtually

    connected to the corresponding lines such thatwhatever is written to these registers appear in

    corresponding lines as voltages, which can be measuredwith a voltmeter. 2hatever is given to

    the parallel port as voltages can be read from these registers. Forinstance, if a -8 is written to the

    data register, the data line D4 will be driven to Mv. 6n the same way,the data lines and the

    control lines can be programmatically turned on and off.

    6n most 1"s, the aforementioned registers are input!output mapped and will therefore

    haveuni#ue addresses. These addresses work with the parallel port. For a typical 1", the base

    address of theprinter port L1T8 is 4xEHI and L1T3 is 4x3HI. The data register resides at this

    base address, statusregister at base address 8 and the control register at base address 3.2ith

    the base address, theaddress of each address of each register can be calculated.

    9.4 Para# Port Pro)rammin)

    1rogramming languages like Gisual Basic, Gisual ", Gisual ", "U, Delphi etc are fast

    and easy tools for developing user friendly applications. They however lack importantfunctionalities like direct access to the parallel port. 2riting programs that communicate with the

    parallel port is easier withoperating systems such as D

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    24/30

    stated above is to write a kernel mode device driver capable of reading and writing to the parallel

    port. The user mode program is then made to communicate with the written device driver. (ome

    of these kernel mode drivers are already written and available as share ware and they include

    hwintaface.dll, io.dll, 6

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    25/30

    9.7 Fin)#r*rint Ba(#d I)nition S5(t#m D#(i)n

    The program codes driving the fingerprint recognition software for ignition system

    control was writtenin visual basic .4 9nterprise 9dition and ran on a 1". 6t uses a set of

    fingerprint images stored in animage folder in its directory. The test images can be enrolled into

    its database after it has gone through the stages of image enhancement, minutiae extraction and

    image post$processing *eliminates falseminutiae+. An image to be recogni&ed is loaded into the

    image area and its extracted minutiae is compared with all the images in the database in the case

    of a 8 to many match, and with ;ust a particular image in the case of a 8 to 8 match. A sufficient

    number of similar minutiae points between the two images compared, indicates that the input

    fingerprint image has a match which exists in thedatabase. An insufficient number of similar

    minutiae points between the two images compared implythat the input fingerprint image has no

    match which exists in the database.

    The results from the matching process are communicated to a section of the recognition

    software which manipulates two data pins of the parallel port. A fingerprint match causes the

    data pinsto be in a high logic level and ideally output about Mvolts while a fingerprint mismatch

    makes the datapins to be in a low logic level and ideally output 4volts.

    An interface control circuit was constructed to link the 1" parallel port to the ignition system ofa

    vehicle. This circuit provides a high degree of electrical isolation between the 1" and the

    ignition system which operate at different voltage levels, through the use of components called

    optocouplers.

    The circuit also provides capabilities for the controlling the ignition system via the

    interconnection of electronic components such as relays, bipolar ;unction transistors, resistors

    and diodes.Three wires from the ignition system of a vehicle are re#uired to be connected to the

    interface circuit. 2hen the parallel port data pins which form part of the connection to the

    interface circuit are in a 76>7 logic level, the interface circuit is triggered to ignite the vehicle.

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    26/30

    The principal components of the prototype system are the fingerprint recognition software andthe

    interface control circuit which are to form a continuous connection with a vehicles ignition

    system.

    The block diagram of the system architecture is shown below

    9.9 T,# Para# Port Int#r!ac# -ontro -ircuit

    The circuit was constructed using two optocouplers, two relays, four resistors, two diode,

    two '1' transistors, and ;umper wires. They components were connected together on a circuit

    board accordingto the arrangement shown in the diagram below

    26

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    27/30

    -ontroin) t,# I)nition S5(t#m

    The mechanism of the ignition system comprise amongst other things, three wires that are

    connected to the key system and used with the keys to ignite the vehicle. Two of these wires are

    bridged when the key is turned first, causing current to flow from the car batteries to all parts of

    the car re#uiring some form of electricity for operation. 2hen the key is turned again, the third

    wire bridges momentarily with the two wires already connected. This causes the cranking of the

    engine, which ignites the vehicle.

    For the purpose of this research work, the three wires were disconnected from the key

    system. The first two wires were connected to the first relay, and the third wire was connected to

    the second relay. This was done to simulate the action of bridging two of the wires together when

    the first relay is activated. Activating the second relay for a short time causes a temporary

    connection between the two relays. This connects all three wires together, thus igniting the

    vehicle. The relays were activated or deactivated by sending appropriate control signals from the

    fingerprint recognition software, via the parallel port to the interface circuit. A correctly

    identified or verified image causes the parallel port control codes in the fingerprint recognition

    software to send about Mvolts to pin 3 of the parallel port. This voltage passes on to the interface

    control circuit and subse#uently activates the first relay. After five seconds, about Mvolts is sent

    again to the pin E of the parallel port for three seconds. This activates the second relay for five

    27

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    28/30

    seconds and deactivates it. The continuous activation of the first relay and the momentary

    activation ofthe second relay cause the vehicle to be ignited.

    "onversely, an incorrectly identified image causes the parallel port control codes in

    thefingerprint recognition software to send about 4volts to pin 3 and pin E of the parallel port.

    Thus, no voltage passes on to the interface control circuit and the two relays remain deactivated.

    This preventsthe vehicle from being ignited.

    SOT ANALYSIS

    STRENGT

    Girtually eliminates unauthori&ed access @educes possibility of auto$theft

    Foolproof means of restricting the ignition of vehicles

    Authorised users can only ignite the vehicle.

    Authentication through the fingerprint images to ignite the Gehicle

    9asy to use

    "ompactable in any model vehicle

    (mall storage space is re#uired

    Fingerprint is most economical biometric technology

    EA=ENESS

    6ntrusive

    28

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    29/30

    /istakes may happen because of dry and dirt skin

    'ot applicable for children

    Authorised users can only ignite the Gehicle

    Average acceptance

    "ost

    "hances for hacking

    'ot always accurate

    OPPORT'NITIES

    Appeals to security$conscious customers

    Appeals to tech$savvy customers

    sefull to 1olice Department

    sefull for 6ndustrial purpose

    sefull for Banks Less completion

    TREATS

    "hances of hacking

    >uessing

    29

  • 7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx

    30/30

    -ON-L'SION

    'ow a days theft of a vehicles are increasing. To prevent from this problem -The

    Fingerprint 6gnition (ystem is used. The theft is controlled by the Finger print matching process.

    Thus fingerprint identification enhances the security of a vehicle and makes it possible only for

    some selected people to start the car. By using the Fingerprint 6gnition (ystem the can enter and

    start the vehicle without the use of keys. This system will provide a uni#ue type of security for

    the customers. The Fingerprint based ignition system will be very usefull to Banks and Finance

    based companies where security for the highly confidential vehicles and for the vehicles

    carrying money are very important. This system can be used by the public too. 6t will appealing

    to the (ecurity "onscious and Tech$(avvy customers. Like the positives ,the system is also

    having its own negatives. There are some chances for hacking of the system,and the people who

    are authorised can only use the system.