+ All Categories
Home > Documents > Int. J. Engg. Res. & Sci. & Tech. 2014 M Sri Ram Prasad ... · This article can be downloaded from...

Int. J. Engg. Res. & Sci. & Tech. 2014 M Sri Ram Prasad ... · This article can be downloaded from...

Date post: 29-May-2018
Category:
Upload: hoanghuong
View: 213 times
Download: 0 times
Share this document with a friend
8
Transcript

This article can be downloaded from http://www.ijerst.com/currentissue.php

90

Int. J. Engg. Res. & Sci. & Tech. 2014 M Sri Ram Prasad and K Srinivasa Ravi, 2014

ISSN 2319-5991 www.ijerst.com

Vol. 3, No. 3, August, 2014

© 2014 IJERST. All Rights Reserved

Research Paper

BIOMETRIC AUTHENTICATION USING

DACTYLOSCOPY FOR OPTIMAL WATER

MANAGEMENT IN DOMESTIC USES

M Sri Ram Prasad1* and K Srinivasa Ravi1

*Corresponding Author: M Sri Ram Prasad, � [email protected]

A biometrics approach that performs authentication via the internal non-visible anatomicalstructure of an individual fingerprint is proposed. To provide authentication, the proposed methodestimates the anatomical characteristics of the dactyloscopy (identification of fingerprint). Theestimation of the dactyloscope characteristics is achieved by analysing the recorded fingerprintlinear homeomorphic mathematical representation of the finger print. This authentication systemis going to give us a chance of making a module which is going to give us an axis to a plant onlyfor authorized people. Here we are using relays to drive motors in three different fields. Waterlevel sensor is here to sense the water level condition and automatically the correspondingmotor will stop and then the next motor will be on. Switches are used as Human Interfacing unit.

Keywords: ARM processor, Dactyloscopy, Fingerprint, Motors, LCD, Water level sensor

1 Department of ECM, K L University, Guntur Dist., INDIA.

INTRODUCTION

The methods of biometric identification have

evolved through-out history from basic measure-

ments of head dimensions to more advanced

techniques involving fingerprints, iris, and face

recognition. But the above mentioned techniques

are not completely fraud proof since they are

based on human body characteristics that can

be replicated with modern technological advan-

ces. As a result there is a significant need in

biometrics research to identify methods that are

highly counterfeit resistant. In this paper we

present a method that has potential to be highly

counterfeit resistant because it employs theauthentication system gives the differentiationbetween authorized and unauthorized people.

The human fingerprint already provides aninformation useful for biometrics. The physicaland behavioural properties of the fingerprints areemployed in biometrics based on the finger printsand recordings of the finger prints of the someauthorized persons.

Biometric authentication via Dactyloscopypromises to be highly repeatable because anytype of random stimulus ideally would producethe same dactyloscopic values. Accurate estima-

This article can be downloaded from http://www.ijerst.com/currentissue.php

91

Int. J. Engg. Res. & Sci. & Tech. 2014 M Sri Ram Prasad and K Srinivasa Ravi, 2014

tion of the dactyloscopic is challenging due to

the scheduled nature of the corresponding

anatomical components, which necessitates

indirect estimation of authorised persons. Let us

name the authorised peoples as A, B, C, D and

so on. Among them if person a started the motor

(when A give finger scan the motor starts

automatically). After the motor, it pumps the water

required for the fields and after the completion

the motor stops and the next motor runs. The

goal of the Person Finger print Authentication

module is to confirm or reject claimed identity

based on the comparison of the two or more FIM

biometric templates.

PROPOSED METHOD

The proposed method is the authentication

system is going to give us a chance of making a

module which is going to give us an axis to a

plant only for authorized people. This authenti-

fication system gives the differentiation between

authorized and unauthorized people. In addition

to this as it is going to work in a Real Time Module

[RTC] is going to be interfaced so that the time of

operation of people and logging time is also

maintained accurately.

In this we are using LCD so that we can see

the status motors in our project. Here we are

using relays to drive motors in three different

fields. Water level sensor is here to sense the

water level condition and automatically the

corresponding motor will stop and then the next

motor will be on. Switches are used as Human

Interfacing unit. The proposed method is also

used domestic uses such as in farming fields,

municipality water supplies. This method gives

fully access to authorised people so that the

excess loss of water will be saved.

This paper describes an on-going project that

aims to contribute to sustainability of irrigated

agriculture by developing, testing and optimizing

in relevant conditions, an irrigation management

system that can be used at farm level in those

situations where there is a limited water supply

and water quality for authorised persons. The

project goals are to improve and optimise deficit

irrigation practices, by helping farmers to control

irrigation systems more efficiently. In addition, it

will develop a tool for (annual) farm zoning and

crop planning.

Figure 1: Block Diagram

The system may serve as an assistant for

communication with higher level water manage-

ment systems at basin scale. If used by most

farmers it allows for longer term estimate of the

water needs at basin level and, the other way

around, it optimises water use at farm level within

the constraints of water availability within the

basin. By testing and calibrating the new system

in various conditions of basin management and

constraints, it will help to ensure that the

environmental and economic performance of

irrigation systems is improved.

BIOMETRIC TECHNOLOGY

Biometrics refers to the quantifiable data (or

metrics) related to human characteristics and

traits. Biometrics identification (or biometric auth-

This article can be downloaded from http://www.ijerst.com/currentissue.php

92

Int. J. Engg. Res. & Sci. & Tech. 2014 M Sri Ram Prasad and K Srinivasa Ravi, 2014

entication) is used in computer science as a formof identification and access control. It is also usedto identify individuals in groups that are undersurveillance. Biometric identifiers are the distinc-tive, measurable characteristics used to label anddescribe individuals. Biometric identifiers areoften categorized as physiological versus beha-vioural characteristics.

Physiological characteristics are related to theshape of the body. Examples include, but are notlimited to fingerprint, face recognition, DNA, palmprint, hand geometry, iris recognition, retina andodour/scent. Behavioural characteristics are relat-ed to the pattern of behaviour of a person, inclu-ding but not limited to typing rhythm, gait, andvoice. Some researchers have coined the termbehaviometrics to describe the latter class ofbiometrics (Dileep Kumar, Yeonseung Ryu,2009).

Biometric Functionality

The block diagram illustrates the two basic modesof a biometric system. First, in verification (orauthentication) mode the system performs a one-to-one comparison of a captured biometric witha specific template stored in a biometric databasein order to verify the individual is the person theyclaim to be. Three steps are involved in the verifi-cation of a person.In the first step, referencemodels for all the users are generated and storedin the model database. In the second step, somesamples are matched with reference models togenerate the genuine and impostor scores andcalculate the threshold. Third step is the testingstep. This process may use a smart card,username or ID number (e.g. PIN) to indicatewhich template should be used for comparison.‘Positive recognition’ is a common use of theverification mode, “where the aim is to preventmultiple people from using same identity” (James

Wayman et al., 2002).

Second, in identification mode the system

performs a one-to-many comparison against a

biometric database in attempt to establish the

identity of an unknown individual. The system will

succeed in identifying the individual if the compa-

rison of the biometric sample to a template in the

database falls within a previously set threshold.

Identification mode can be used either for ‘positive

recognition’ (so that the user does not have to

provide any information about the template to be

used) or for ‘negative recognition’ of the person

“where the system establishes whether the

person is who she denies to be”. The latter func-

tion can only be achieved through biometrics

since other methods of personal recognition such

as passwords, PINs or keys are ineffective.

Fingerprint Recognition

Fingerprint matching techniques can be placedinto two categories: minutae-based and corre-lation based. Minutiae-based techniques first findminutiae points and then map their relative place-ment on the finger. However, there are some diffi-culties when using this approach. It is difficult toextract the minutiae points accurately when thefingerprint is of low quality. Also this method doesnot take into account the global pattern of ridges

Figure 2: Biometric Functionality

This article can be downloaded from http://www.ijerst.com/currentissue.php

93

Int. J. Engg. Res. & Sci. & Tech. 2014 M Sri Ram Prasad and K Srinivasa Ravi, 2014

and furrows. The correlation-based method isable to overcome some of the difficul-ties of theminutiae-based approach. However, it has someof its own shortcomings. Correlation-based tech-niques require the precise location of a regis-tration point and are affected by image translationand rotation (Marios Savvides ECE & CyLab,xxxx).

LPC2148

General Description

The LPC2141/42/44/46/48 microcontrollers are

based on a 16-bit/32-bit ARM7TDMI-S CPU with

real-time emulation and embedded trace support,

that combine microcontroller with embedded high

speed flash memory ranging from 32 kB to 512

kB. A 128-bit wide memory interface and a unique

accelerator architecture enable 32-bit code

execution at the maximum clock rate. For critical

code size applications, the alternative 16-bit

Thumb mode reduces code by more than 30 %

with minimal performance penalty. Due to their

tiny size and low power consumption, LPC2141/

42/44/46/48 are ideal for applications where

miniaturization is a key requirement, such as

access control and point-of-sale. Serial commu-

nications interfaces ranging from a USB 2.0 Full-

speed device, multiple UARTs, SPI, SSP to I2C-

bus and on-chip SRAM of 8 kB up to 40 kB, make

these devices very well suited for communication

gateways and protocol converters, soft modems,

voice recognition and low end imaging, providing

both large buffer size and high processing power.

Various 32-bit timers, single or dual 10-bit ADC(s),

10-bit DAC, PWM channels and 45 fast GPIO

lines with up to nine edge or level sensitive exter-

nal interrupt pins make these micro controllers

suitable for industrial control and medical sys-

tems.

Features

16-bit/32-bit ARM7TDMI-S microcontroller in a

tiny LQFP64 package.

8 kB to 40 kB of on-chip static RAM and 32

kB to 512 kB of on-chip flash memory. 128-bit

wide interface/accelerator enables high-speed 60

MHz operation.

USB 2.0 Full-speed compliant device

controller with 2 kB of endpoint RAM. In addition,

the LPC2146/48 provides 8 kB of on-chip RAM

accessible to USB by DMA.

One or two (LPC2141/42 vs. LPC2144/46/48)

10-bit ADCs provide a total of 6/14 analog inputs,

with conversion times as low as 2.44 ?s per

channel.

Single 10-bit DAC provides variable analog

output (LPC2142/44/46/48 only).

Two 32-bit timers/external event counters (with

four capture and four compare channels each),

PWM unit (six outputs) and watchdog.

Low power Real-Time Clock (RTC) with

independent power and 32 kHz clock input [11].

EXPERIMENTAL SETUP

We used LPC 2148 Board and Fingerprint

module is connected to lpc2148 board and two

pins are connected to receiver and transmitter

pin to arm7 and other two pins are connected to

gnd and vcc to arm7. Two AC motors are

connected to triac board which is used for the

conversion of dc voltage to ac voltage.

Figure 3: Fingerprint Recognition

This article can be downloaded from http://www.ijerst.com/currentissue.php

94

Int. J. Engg. Res. & Sci. & Tech. 2014 M Sri Ram Prasad and K Srinivasa Ravi, 2014

ADVANTAGES

The excess loss of water will be low and provides

good security for the water in the municipalities

water tanks and farm fields. The power load will

be reduced by placing the two or more motors

when compared with the placing of single motor.

The water miss usage will be reduced. This also

allows only authorized people to operate.

FUTURE SCOPE

The performance of the system can be further

improved in terms of the operating speed,

memory capacity, instruction cycle period of the

microcontroller by using other controllers versions

such ARM 9 or ARM Cortex. The number of

channels can be increased to interface more

number of sensors which is possible by using

advanced versions of microcontrollers. A GSM

can be placed for receiving the messages that

the condition of the motor is ON or OF. This

system can be connected to communication

devices such as modems, cellular phones or

satellite terminal to enable there mote collection

of recorded data or alarming of certain

parameters. The device can be made to perform

better by providing the power supply with the help

of battery source which can be rechargeable or

non-rechargeable, to reduce the requirement of

main AC power.

CONCLUSION

The project will provide appropriate technology

to assist with improved management of water at

the farm level and a good communication with

water management at the basin level.

This project gives local farmers tools to

operate irrigation in such a way that they can

manage deficit conditions. The tool will help to (i)

increase economic efficiency of application under

deficit and (ii) decrease pressure on waterresources by stimulating exploitation of marginalwater for irrigation. By using these tools farmerslearn how to cope with less water, or moreexpensive water in future. Having these newtechnology tools available, it is easier for futureresearch to evaluate the feasibility of neweconomic strategies and incentives for waterpricing.

The proposed project is targeted directly atsustainable management of scarce regionalwater resources that are presently beingwastefully applied to agricultural production. Assuch, the project will provide a tool to help combatthe effects of climate change. In particular, theresearch activities proposed here focus ondeveloping a directly applicable, cost-effectivetool for improving use efficiency of irrigation water.Such a tool will result from the combination ofindividual technological steps into a packagesuitable for exploitation by farmers and managersof water services, with due account for the socioeconomical context. The utility of the approachis to provide a tested hardware system that canbe driven by flexible decision support software.

REFERENCES

1. Balendonck J, Stanghellini C and HemmingJ (2007), “Farm Level Optimal WaterManagement: As Instant for Irrigation UnderDeficit (flow- aid)”.

2. Dileep Kumar and Yeonseung Ryu (2009),“A Brief Introduction of Biometrics andFingerprint Payment Technology”,Department of Computer Software MyongjiUniversity, Yongin-Si, Kyonggi-Do, SouthKorea.

3. Iqbal Singh and Meenakshi Bansal (2011),“Monitoring Water Level in Agriculture UsingSensor Networks”.

This article can be downloaded from http://www.ijerst.com/currentissue.php

95

Int. J. Engg. Res. & Sci. & Tech. 2014 M Sri Ram Prasad and K Srinivasa Ravi, 2014

4. James Wayman, Anil Jain, Davide Maltoni

and Dario Maio (2002), “An Introduction to

Biometric Authentication Systems”.

5. Komogortsev O V, Karpov A and Price L R

(2012), “Biometric Authentication Via

Oculomotor Plant Characteristics”.

6. K Sriharsha et al. (2012), “Monitoring The

Paddy Crop Field Using Zigbee Network”,

International Journal of Computer and

Electronics Research, Vol. 1, No. 4.

7. Oleg V Komogortsev, Alex Karpov and

Cecilia Aragon (2012), “Biometric

Authentication Via Anatomical

Characteristics of the Oculomotor Plant”,

Texas State University, University of

Washington.

8. Prof. Marios Savvides (2002), “Introduction

to Biometric Technologies and Applications”,

ECE & CyLab, Carnegie Mellon University.

9. Santhosh Simon and K Paulose Jacob

(2012), “Wireless Sensor Networks for Paddy

Field Crop Monitoring Application in

Kuttanad”, Department of Computer Science,

Cochin University of Science and

Technology, Kerala, India.


Recommended