Open Access Open Access  Restricted Access Subscription or Fee Access

Preventing Mobility Device Intrusion and Information Theft Using Biometric Fingerprint Recognition

P. Vidhya Gandhi, M. Vanitha, S. Rajkumar


Fingerprint based authentication system project is used to more secured your system compare to all other security device which uses biometric reader. In the project data from the finger print is send to the system through port and fingerprint reader is used to read the data from port and validate the data with your data. If the validation output success then the user would be allowed else it blocks the user to allow. The system have to use third party component to read or send the data through the serial port. In the project implementation you have to enter your data (user id and password) after register finger print, so data for the validation could be catch directly from finger print through the serial port. After read the data from serial port using third party component in biometric database FVC2004, it checks whether the entered by the user and reading data’s are match or not. After your successful validation (match) you can move ahead for further works else you can’t. In an existing system we secure the system through check whether the user id and password match with data’s in database or not, but it’s possible to steal the data from the database. So it’s not highly secured so go for the implementation of fingerprint based authentication system project. Fingerprint based authentication system project is more secured compare to all other securities, because you can’t stole any user information due to high security. Information stored in fingerprint is only known by the user so even through unknown person uses the fingerprint they can’t enter the correct data while we checking. If the third person uses fake finger print to access the system, which is also recognized and block the user to use. Finally we conclude no way to steal the user’s data and we can maintain the user’s information safely and securely, so fingerprint based authentication system is more secured compare to all other security device or system.


Biometric Database, User Identification, Security, Fingerprint, Matching.

Full Text:



A.K. Jain, L. Hong, S. Pankanti, and R. Boole, “An identity authentication system using fingerprints,” IEEE Automated Biometrics, vol. 85, no. 9, pp.1365-1492, 1997.

S. Prabhakar, S. Pankanti, and A.K. Jain, “Biometric recognition: Security and privacy concerns,” IEEE Security Privacy Mag., vol.1, no.2, pp.33-42, 2003.

S. Chikkerur, “Online fingerprint verification system,” Master’s thesis, State University of New York at Buffalo, 2005.

A.K. Jain, S. Prabhaker, and S. Pankanti, “Matching and Classification: A Case Study in Fingerprint Domain,” Proc. Indian National Science Academy, 2001.

R. Myers, R. Wilson, and E. Hancock, “Bayesian Graph Edit Distance,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 6, 2000.

S. Chikkerur, A. Cartwright, and V. Govindaraju, “Fingerprint Image Enhancement Using STFT Analysis,” J. Pattern Recognition, 2006.

O. K. AI-Shaykh, and J. F. Dohcrty, “Invariant image analysis based on Radon transform and SVD,” IEEE Trans. Circuits Syst.II: Analog and digital signal processing, vol. 43, no. 2, pp. 123133, 1996.

D. V. Jadhav, and R. S. Holambe, “Radon and discrete cosine transforms based feature extraction and dimensionality reduction approach for face recognition,” Signal Process., vol. 88, pp. 26042609, 2008.

H. Lee, S.-H. Lee, T. Kim, and H. Bahn, “Secure user identification for consumer electronics devices,” IEEE Trans. Consumer Electron., vol. 54, no. 4, pp. 1798-1802, Nov. 2008.

A. K. Jain, L. Hong, S. Pankanti, and R. Boole, “An identityauthentication system using fingerprints,” Proc. IEEE, vol. 85, no. 9, pp.1365-1388, Sept. 1997.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.