Академический Документы
Профессиональный Документы
Культура Документы
SEMINAR REPORT
On
By
Mr. Ashish Deo
T.E. (COMPUTER)
Roll No – 07
Guided by
Prof. Vina M. Lomte
TSSM's
PADMABHOOSHAN VASANTDADA PATIL INSTITUTE OF TECHNOLOGY,
BAVDHAN, PUNE-21
(2010-2011)
TSSM's
PADMABHOOSHAN VASANTDADA PATIL INSTITUTE OF
TECHNOLOGY, BAVDHAN, PUNE-21
(2010-2011)
CERTIFICATE
Date:-
Place: - Pune
ACKNOWLEDGEMENT
When the compilation of seminar report comes to an end, the time comes to
acknowledge all persons who have made its success possible. It gives me
immense pleasure to express our gratitude to each individual associated directly
or indirectly with the successful completion of the seminar report.
I would like to take this opportunity to specially thank our guide, Prof. Vina. M.
Lomte , of Computer Department, PVPIT, Bavdhan, Pune , for vesting trust in
me.
1. Introduction 1
1.1 NEED OF THE SYSTEM 1
1.2 Problem Statement 2
1.3 System Overview 2
1.3.1 About 3-tier Security 3
2. Literature Survey 4
2.1 Background 4
2.1.1 Fuzzy Vault 4
2.1.2 Minutiae Structures 5
2.1.3 Cyclic Redundancy Check (CRC) 6
3. General Description 7
3.1 FUZZY FINGERPRINT VAULT SCHEME 7
4. Requirement Specification 9
4.1 Purpose 9
4.2 Scope 9
4.3 DEFINITIONS, ACRONYMS AND 9
ABBREVIATIONS
4.3.1 Definition 9
4.3.2 Acronyms 10
4.4 User Interface 10
4.5 Software System Attributes 10
5. Implementation Plan 11
5.1 Encoding Process 12
5.1.1 CRC calucations 13
5.2 Decoding Process 16
6. Conclusion 18
7. Future Scope 19
8 References 20
List Of Figures
1. Concept of 3-Tier 3
2. Five nearest neighbor based structures 5
3. Voronoi neighbors based structure 5
4. Triangle based structures 6
5. Basic Fuzzy vault structure 7
6. Fingerprint Images with overlaid minutiae 11
(a) Template Image (28 Minutiae)
(b) Query Image (26 Minutiae)