Date post: | 29-May-2018 |
Category: |
Documents |
Upload: | hoanghuong |
View: | 213 times |
Download: | 0 times |
This article can be downloaded from http://www.ijerst.com/currentissue.php
90
Int. J. Engg. Res. & Sci. & Tech. 2014 M Sri Ram Prasad and K Srinivasa Ravi, 2014
ISSN 2319-5991 www.ijerst.com
Vol. 3, No. 3, August, 2014
© 2014 IJERST. All Rights Reserved
Research Paper
BIOMETRIC AUTHENTICATION USING
DACTYLOSCOPY FOR OPTIMAL WATER
MANAGEMENT IN DOMESTIC USES
M Sri Ram Prasad1* and K Srinivasa Ravi1
*Corresponding Author: M Sri Ram Prasad, � [email protected]
A biometrics approach that performs authentication via the internal non-visible anatomicalstructure of an individual fingerprint is proposed. To provide authentication, the proposed methodestimates the anatomical characteristics of the dactyloscopy (identification of fingerprint). Theestimation of the dactyloscope characteristics is achieved by analysing the recorded fingerprintlinear homeomorphic mathematical representation of the finger print. This authentication systemis going to give us a chance of making a module which is going to give us an axis to a plant onlyfor authorized people. Here we are using relays to drive motors in three different fields. Waterlevel sensor is here to sense the water level condition and automatically the correspondingmotor will stop and then the next motor will be on. Switches are used as Human Interfacing unit.
Keywords: ARM processor, Dactyloscopy, Fingerprint, Motors, LCD, Water level sensor
1 Department of ECM, K L University, Guntur Dist., INDIA.
INTRODUCTION
The methods of biometric identification have
evolved through-out history from basic measure-
ments of head dimensions to more advanced
techniques involving fingerprints, iris, and face
recognition. But the above mentioned techniques
are not completely fraud proof since they are
based on human body characteristics that can
be replicated with modern technological advan-
ces. As a result there is a significant need in
biometrics research to identify methods that are
highly counterfeit resistant. In this paper we
present a method that has potential to be highly
counterfeit resistant because it employs theauthentication system gives the differentiationbetween authorized and unauthorized people.
The human fingerprint already provides aninformation useful for biometrics. The physicaland behavioural properties of the fingerprints areemployed in biometrics based on the finger printsand recordings of the finger prints of the someauthorized persons.
Biometric authentication via Dactyloscopypromises to be highly repeatable because anytype of random stimulus ideally would producethe same dactyloscopic values. Accurate estima-
This article can be downloaded from http://www.ijerst.com/currentissue.php
91
Int. J. Engg. Res. & Sci. & Tech. 2014 M Sri Ram Prasad and K Srinivasa Ravi, 2014
tion of the dactyloscopic is challenging due to
the scheduled nature of the corresponding
anatomical components, which necessitates
indirect estimation of authorised persons. Let us
name the authorised peoples as A, B, C, D and
so on. Among them if person a started the motor
(when A give finger scan the motor starts
automatically). After the motor, it pumps the water
required for the fields and after the completion
the motor stops and the next motor runs. The
goal of the Person Finger print Authentication
module is to confirm or reject claimed identity
based on the comparison of the two or more FIM
biometric templates.
PROPOSED METHOD
The proposed method is the authentication
system is going to give us a chance of making a
module which is going to give us an axis to a
plant only for authorized people. This authenti-
fication system gives the differentiation between
authorized and unauthorized people. In addition
to this as it is going to work in a Real Time Module
[RTC] is going to be interfaced so that the time of
operation of people and logging time is also
maintained accurately.
In this we are using LCD so that we can see
the status motors in our project. Here we are
using relays to drive motors in three different
fields. Water level sensor is here to sense the
water level condition and automatically the
corresponding motor will stop and then the next
motor will be on. Switches are used as Human
Interfacing unit. The proposed method is also
used domestic uses such as in farming fields,
municipality water supplies. This method gives
fully access to authorised people so that the
excess loss of water will be saved.
This paper describes an on-going project that
aims to contribute to sustainability of irrigated
agriculture by developing, testing and optimizing
in relevant conditions, an irrigation management
system that can be used at farm level in those
situations where there is a limited water supply
and water quality for authorised persons. The
project goals are to improve and optimise deficit
irrigation practices, by helping farmers to control
irrigation systems more efficiently. In addition, it
will develop a tool for (annual) farm zoning and
crop planning.
Figure 1: Block Diagram
The system may serve as an assistant for
communication with higher level water manage-
ment systems at basin scale. If used by most
farmers it allows for longer term estimate of the
water needs at basin level and, the other way
around, it optimises water use at farm level within
the constraints of water availability within the
basin. By testing and calibrating the new system
in various conditions of basin management and
constraints, it will help to ensure that the
environmental and economic performance of
irrigation systems is improved.
BIOMETRIC TECHNOLOGY
Biometrics refers to the quantifiable data (or
metrics) related to human characteristics and
traits. Biometrics identification (or biometric auth-
This article can be downloaded from http://www.ijerst.com/currentissue.php
92
Int. J. Engg. Res. & Sci. & Tech. 2014 M Sri Ram Prasad and K Srinivasa Ravi, 2014
entication) is used in computer science as a formof identification and access control. It is also usedto identify individuals in groups that are undersurveillance. Biometric identifiers are the distinc-tive, measurable characteristics used to label anddescribe individuals. Biometric identifiers areoften categorized as physiological versus beha-vioural characteristics.
Physiological characteristics are related to theshape of the body. Examples include, but are notlimited to fingerprint, face recognition, DNA, palmprint, hand geometry, iris recognition, retina andodour/scent. Behavioural characteristics are relat-ed to the pattern of behaviour of a person, inclu-ding but not limited to typing rhythm, gait, andvoice. Some researchers have coined the termbehaviometrics to describe the latter class ofbiometrics (Dileep Kumar, Yeonseung Ryu,2009).
Biometric Functionality
The block diagram illustrates the two basic modesof a biometric system. First, in verification (orauthentication) mode the system performs a one-to-one comparison of a captured biometric witha specific template stored in a biometric databasein order to verify the individual is the person theyclaim to be. Three steps are involved in the verifi-cation of a person.In the first step, referencemodels for all the users are generated and storedin the model database. In the second step, somesamples are matched with reference models togenerate the genuine and impostor scores andcalculate the threshold. Third step is the testingstep. This process may use a smart card,username or ID number (e.g. PIN) to indicatewhich template should be used for comparison.‘Positive recognition’ is a common use of theverification mode, “where the aim is to preventmultiple people from using same identity” (James
Wayman et al., 2002).
Second, in identification mode the system
performs a one-to-many comparison against a
biometric database in attempt to establish the
identity of an unknown individual. The system will
succeed in identifying the individual if the compa-
rison of the biometric sample to a template in the
database falls within a previously set threshold.
Identification mode can be used either for ‘positive
recognition’ (so that the user does not have to
provide any information about the template to be
used) or for ‘negative recognition’ of the person
“where the system establishes whether the
person is who she denies to be”. The latter func-
tion can only be achieved through biometrics
since other methods of personal recognition such
as passwords, PINs or keys are ineffective.
Fingerprint Recognition
Fingerprint matching techniques can be placedinto two categories: minutae-based and corre-lation based. Minutiae-based techniques first findminutiae points and then map their relative place-ment on the finger. However, there are some diffi-culties when using this approach. It is difficult toextract the minutiae points accurately when thefingerprint is of low quality. Also this method doesnot take into account the global pattern of ridges
Figure 2: Biometric Functionality
This article can be downloaded from http://www.ijerst.com/currentissue.php
93
Int. J. Engg. Res. & Sci. & Tech. 2014 M Sri Ram Prasad and K Srinivasa Ravi, 2014
and furrows. The correlation-based method isable to overcome some of the difficul-ties of theminutiae-based approach. However, it has someof its own shortcomings. Correlation-based tech-niques require the precise location of a regis-tration point and are affected by image translationand rotation (Marios Savvides ECE & CyLab,xxxx).
LPC2148
General Description
The LPC2141/42/44/46/48 microcontrollers are
based on a 16-bit/32-bit ARM7TDMI-S CPU with
real-time emulation and embedded trace support,
that combine microcontroller with embedded high
speed flash memory ranging from 32 kB to 512
kB. A 128-bit wide memory interface and a unique
accelerator architecture enable 32-bit code
execution at the maximum clock rate. For critical
code size applications, the alternative 16-bit
Thumb mode reduces code by more than 30 %
with minimal performance penalty. Due to their
tiny size and low power consumption, LPC2141/
42/44/46/48 are ideal for applications where
miniaturization is a key requirement, such as
access control and point-of-sale. Serial commu-
nications interfaces ranging from a USB 2.0 Full-
speed device, multiple UARTs, SPI, SSP to I2C-
bus and on-chip SRAM of 8 kB up to 40 kB, make
these devices very well suited for communication
gateways and protocol converters, soft modems,
voice recognition and low end imaging, providing
both large buffer size and high processing power.
Various 32-bit timers, single or dual 10-bit ADC(s),
10-bit DAC, PWM channels and 45 fast GPIO
lines with up to nine edge or level sensitive exter-
nal interrupt pins make these micro controllers
suitable for industrial control and medical sys-
tems.
Features
16-bit/32-bit ARM7TDMI-S microcontroller in a
tiny LQFP64 package.
8 kB to 40 kB of on-chip static RAM and 32
kB to 512 kB of on-chip flash memory. 128-bit
wide interface/accelerator enables high-speed 60
MHz operation.
USB 2.0 Full-speed compliant device
controller with 2 kB of endpoint RAM. In addition,
the LPC2146/48 provides 8 kB of on-chip RAM
accessible to USB by DMA.
One or two (LPC2141/42 vs. LPC2144/46/48)
10-bit ADCs provide a total of 6/14 analog inputs,
with conversion times as low as 2.44 ?s per
channel.
Single 10-bit DAC provides variable analog
output (LPC2142/44/46/48 only).
Two 32-bit timers/external event counters (with
four capture and four compare channels each),
PWM unit (six outputs) and watchdog.
Low power Real-Time Clock (RTC) with
independent power and 32 kHz clock input [11].
EXPERIMENTAL SETUP
We used LPC 2148 Board and Fingerprint
module is connected to lpc2148 board and two
pins are connected to receiver and transmitter
pin to arm7 and other two pins are connected to
gnd and vcc to arm7. Two AC motors are
connected to triac board which is used for the
conversion of dc voltage to ac voltage.
Figure 3: Fingerprint Recognition
This article can be downloaded from http://www.ijerst.com/currentissue.php
94
Int. J. Engg. Res. & Sci. & Tech. 2014 M Sri Ram Prasad and K Srinivasa Ravi, 2014
ADVANTAGES
The excess loss of water will be low and provides
good security for the water in the municipalities
water tanks and farm fields. The power load will
be reduced by placing the two or more motors
when compared with the placing of single motor.
The water miss usage will be reduced. This also
allows only authorized people to operate.
FUTURE SCOPE
The performance of the system can be further
improved in terms of the operating speed,
memory capacity, instruction cycle period of the
microcontroller by using other controllers versions
such ARM 9 or ARM Cortex. The number of
channels can be increased to interface more
number of sensors which is possible by using
advanced versions of microcontrollers. A GSM
can be placed for receiving the messages that
the condition of the motor is ON or OF. This
system can be connected to communication
devices such as modems, cellular phones or
satellite terminal to enable there mote collection
of recorded data or alarming of certain
parameters. The device can be made to perform
better by providing the power supply with the help
of battery source which can be rechargeable or
non-rechargeable, to reduce the requirement of
main AC power.
CONCLUSION
The project will provide appropriate technology
to assist with improved management of water at
the farm level and a good communication with
water management at the basin level.
This project gives local farmers tools to
operate irrigation in such a way that they can
manage deficit conditions. The tool will help to (i)
increase economic efficiency of application under
deficit and (ii) decrease pressure on waterresources by stimulating exploitation of marginalwater for irrigation. By using these tools farmerslearn how to cope with less water, or moreexpensive water in future. Having these newtechnology tools available, it is easier for futureresearch to evaluate the feasibility of neweconomic strategies and incentives for waterpricing.
The proposed project is targeted directly atsustainable management of scarce regionalwater resources that are presently beingwastefully applied to agricultural production. Assuch, the project will provide a tool to help combatthe effects of climate change. In particular, theresearch activities proposed here focus ondeveloping a directly applicable, cost-effectivetool for improving use efficiency of irrigation water.Such a tool will result from the combination ofindividual technological steps into a packagesuitable for exploitation by farmers and managersof water services, with due account for the socioeconomical context. The utility of the approachis to provide a tested hardware system that canbe driven by flexible decision support software.
REFERENCES
1. Balendonck J, Stanghellini C and HemmingJ (2007), “Farm Level Optimal WaterManagement: As Instant for Irrigation UnderDeficit (flow- aid)”.
2. Dileep Kumar and Yeonseung Ryu (2009),“A Brief Introduction of Biometrics andFingerprint Payment Technology”,Department of Computer Software MyongjiUniversity, Yongin-Si, Kyonggi-Do, SouthKorea.
3. Iqbal Singh and Meenakshi Bansal (2011),“Monitoring Water Level in Agriculture UsingSensor Networks”.
This article can be downloaded from http://www.ijerst.com/currentissue.php
95
Int. J. Engg. Res. & Sci. & Tech. 2014 M Sri Ram Prasad and K Srinivasa Ravi, 2014
4. James Wayman, Anil Jain, Davide Maltoni
and Dario Maio (2002), “An Introduction to
Biometric Authentication Systems”.
5. Komogortsev O V, Karpov A and Price L R
(2012), “Biometric Authentication Via
Oculomotor Plant Characteristics”.
6. K Sriharsha et al. (2012), “Monitoring The
Paddy Crop Field Using Zigbee Network”,
International Journal of Computer and
Electronics Research, Vol. 1, No. 4.
7. Oleg V Komogortsev, Alex Karpov and
Cecilia Aragon (2012), “Biometric
Authentication Via Anatomical
Characteristics of the Oculomotor Plant”,
Texas State University, University of
Washington.
8. Prof. Marios Savvides (2002), “Introduction
to Biometric Technologies and Applications”,
ECE & CyLab, Carnegie Mellon University.
9. Santhosh Simon and K Paulose Jacob
(2012), “Wireless Sensor Networks for Paddy
Field Crop Monitoring Application in
Kuttanad”, Department of Computer Science,
Cochin University of Science and
Technology, Kerala, India.