Вы находитесь на странице: 1из 6

A

SEMINAR REPORT

On

Folder Security Using Biometrics In Fuzzy Vault

By
Mr. Ashish Deo
T.E. (COMPUTER)
Roll No – 07

Guided by
Prof. Vina M. Lomte

DEPARTMENT OF COMPUTER ENGINEERING,

TSSM's
PADMABHOOSHAN VASANTDADA PATIL INSTITUTE OF TECHNOLOGY,
BAVDHAN, PUNE-21
(2010-2011)
TSSM's
PADMABHOOSHAN VASANTDADA PATIL INSTITUTE OF
TECHNOLOGY, BAVDHAN, PUNE-21
(2010-2011)

CERTIFICATE

This is to certify that seminar report titled “Folder Security Using


Biometrics In Fuzzy Vault” for the T.E. (Computer) is the bonafide work of
Mr. Ashish Deo who has carried out the seminar under my guidance in partial
fulfillment of the requirement for the degree COMPUTER ENGINEERING of
PADMABHOOSHAN VASANTDADA PATIL INSTITUTE OF
TECHNOLOGY, BAVDHAN, PUNE-21 during the academic year 2010-11

Prof. Vina. M. Lomte Prof. Y. B. Gurav


(Seminar Guide) (Head of Computer Department)

Date:-
Place: - Pune
ACKNOWLEDGEMENT

When the compilation of seminar report comes to an end, the time comes to
acknowledge all persons who have made its success possible. It gives me
immense pleasure to express our gratitude to each individual associated directly
or indirectly with the successful completion of the seminar report.
I would like to take this opportunity to specially thank our guide, Prof. Vina. M.
Lomte , of Computer Department, PVPIT, Bavdhan, Pune , for vesting trust in
me.

Mr. Ashish Deo.


T.E. COMPUTER,
Roll No.-07
CONTENT
List Of Figure VI

S.NO TOPIC NAME PAGE


NO

1. Introduction 1
1.1 NEED OF THE SYSTEM 1
1.2 Problem Statement 2
1.3 System Overview 2
1.3.1 About 3-tier Security 3

2. Literature Survey 4
2.1 Background 4
2.1.1 Fuzzy Vault 4
2.1.2 Minutiae Structures 5
2.1.3 Cyclic Redundancy Check (CRC) 6

3. General Description 7
3.1 FUZZY FINGERPRINT VAULT SCHEME 7
4. Requirement Specification 9
4.1 Purpose 9
4.2 Scope 9
4.3 DEFINITIONS, ACRONYMS AND 9
ABBREVIATIONS
4.3.1 Definition 9
4.3.2 Acronyms 10
4.4 User Interface 10
4.5 Software System Attributes 10
5. Implementation Plan 11
5.1 Encoding Process 12
5.1.1 CRC calucations 13
5.2 Decoding Process 16
6. Conclusion 18
7. Future Scope 19
8 References 20
List Of Figures

S.NO FIGURE NAME PAGE


NO

1. Concept of 3-Tier 3
2. Five nearest neighbor based structures 5
3. Voronoi neighbors based structure 5
4. Triangle based structures 6
5. Basic Fuzzy vault structure 7
6. Fingerprint Images with overlaid minutiae 11
(a) Template Image (28 Minutiae)
(b) Query Image (26 Minutiae)

7. Fuzzy vault encoding 12


8. Calculation of the polynomial code checksum 14
9. Fuzzy vault decoding 16
ABSTRACT

We present the motivation and our concept of introducing “Web


Engineering” as a specialization of our “Software Engineering” curriculum.
Our main focus lies on the differences in project management education for
both areas as well as the necessary process models and tools. First we discuss
the principal differences of software project management and web project
management, focusing on the main difficulties of teaching such management
skills to primarily technophile students. Then we analyze the composition of
modern software development teams and changes within such teams implied
by the development of web applications. We illustrate this transition showing
how a merely document-driven process – as can be found in many traditional
software development projects – is turned into a highly tool-supported, agile
development process, which is characteristic for web development projects.

Вам также может понравиться