Medical Card System with Fingerprint Authentication Luvuyo Morris Supervisor: Mr. R. Dodds Co-Supervisor: Mr. M. Ghazi-Asgar Mentor: Mr. Roland Foster.

Slides:



Advertisements
Similar presentations
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Advertisements

NATHAN DE LA CRUZ SUPERVISOR: MEHRDAD GHAZIASGAR MENTORS: DANE BROWN AND DIEGO MUSHFIELDT Lie Detection System Using Facial Expressions.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Student: Ibraheem Frieslaar Supervisor: Mehrdad Ghaziasgar.
Student: Jihaad Pienaar Supervisor: Mr Mehrdad Ghaziasgar Co-Supervisor: Mr James Connan Mentors: Mr Roland Foster & Mr Kenzo Abrahams Anaglyph Videos.
Fingerprint Synthesis An Hong Tran. Outline Introduction Haar Wavelet Transform Fingerprint Synthesis Application Results Conclusion.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Luvuyo Morris Supervisor: Mr. R. Dodds Co-Supervisor: Mr. M. Ghazi-Asgar Mentor: Mr. Mentor: Mr. Roland Foster.
CS771 Machine Learning : Tools, Techniques & Application Gaurav Krishna Y Harshit Maheshwari Pulkit Jain Sayantan Marik
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
Biometrics: Ear Recognition
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Introduction to Biometric Systems
Project 2 SIFT Matching by Hierarchical K-means Quantization
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
By Roland Foster Supervisors: Mr. Mehrdad Ghaziasgar Mr. James Connan Mentor: Mr. Warren Nel.
Anaglyph Videos Student:Jihaad Pienaar Supervisor: Mehrdad Ghaziasgar & James Connan Mentors: Roland Foster & Kenzo Abrahams.
1 Stuart West Content-Based Information Retrieval (CBIR) in Images The Applications and the Real World Uses.
Capturing, Encoding and Rendering Gestures using the Kinect Adan Patience Supervisor: Mr. Mehrdad Ghaziasgar Co-Supervisor: Mr. Reginald McDonald Dodds.
Project Proposal Lebeko Poulo, Jorgina Paihama & Morwan Mohamed Nour Supervisor: Dr. Hussein Suleman Co-supervisor: Hisham Abdalla (PhD Student) 14 th.
MOBILE MEDICAL INFORMATION FOR THE DEAF By: Siphokazi Dayile Supervisor: Prof I Venter Co-supervisor: Prof WD Tucker.
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
By Roland Foster Supervisors: Mr. Mehrdad Ghaziasgar Mr. James Connan Mentor: Mr. Warren Nel.
Front end for monitoring Mesh Network By Lesetsa Mojapelo Supervisor: Prof. W.D. Tucker Co-Supervisor: Mr M. Norman Mentor: Mr Carlos Rey-Moreno.
By: Kenzo Abrahams Supervisor: Mehrdad Ghaziasgar Co-supervisor: James Connan Mentored by: Diego Mushfieldt.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Biometrics Authentication Technology
Change management model Changes to be implemented Facts The information gathering process Awareness on the needs of the patients Awareness on.
March 31, 1998NSF IDM 98, Group F1 Group F Multi-modal Issues, Systems and Applications.
Kearan Mc Pherson Mr. J. Connan. Overview Introduction Design Decisions Implementation Project Plan Demo.
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
Student: Ibraheem Frieslaar Supervisor: Mehrdad Ghaziasgar.
Virtual Desktop Peephole By Kyle Patience Supervisor: Reginald Dodds Co Supervisor: Mehrdad Ghaziasgar.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Virtual Image Peephole By Kyle Patience Supervisor: Reg Dodds Co Supervisor: Mehrdad Ghaziasgar.
Final Year Project Vision based biometric authentication system By Padraic ó hIarnain.
The Optical Telemeter Supervisor - Mr Reg Dodds Co – Supervisor - Mentor- Mr Dane Brown Presented by Mutende Msiska.
By Roland Foster Supervisors: Mr. Mehrdad Ghaziasgar Mr. James Connan Mentor: Mr. Warren Nel.
Capturing, Encoding and Rendering Gestures using the Kinect Adan Patience Supervisor: Mr. Merhdad Ghaziasgar Co-Supervisor: Mr. R Dodds Mentor: Mr. Kenzo.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Tommy Truong. Objective : To enhance noisy fingerprint images in order to be processed by an automatic fingerprint recognition system, which extracts.
THIRD CLASSIFICATION OF MICROCALCIFICATION STAGES IN MAMMOGRAPHIC IMAGES THIRD REVIEW Supervisor: Mrs.P.Valarmathi HOD/CSE Project Members: M.HamsaPriya( )
Project 3 SIFT Matching by Binary SIFT
Anaglyph Videos Student:Jihaad Pienaar Supervisor: Mr Mehrdad Ghaziasgar Co-Supervisor:Mr James Connan Mentors: Mr Roland Foster & Mr Kenzo Abrahams.
1 Information Systems Development (IS501) Students : 1- Omnia Gomaa 2- Nagat Mohamed 3- Noha 4- Ali Ahmed Supervisor : Dr.Doaa Nabil.
MULTIMEDIA SYSTEMS CBIR & CBVR. Schedule Image Annotation (CBIR) Image Annotation (CBIR) Video Annotation (CBVR) Video Annotation (CBVR) Few Project Ideas.
Student: Dane Brown Supervisor : James Connan Co-Supervisor : Mehrdad Ghaziasgar.
MEDICAL RECORD BROKER -LAVANYA GUNDAMARAJU Introduction Introduction n Database and database systems have become an essential part of everyday life.
Introduction to Android Programming. Features of Android.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
AHED Automatic Human Emotion Detection
FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM.
Twitter Augmented Android Malware Detection
Customer Satisfaction Based on Voice Signals
Customer Satisfaction Based on Voice
Fingerprint Recognition
SUSPICIOUS ACTIVITY DETECTION
T H E P U B G P R O J E C T.
Hybrid Finger print recognition
AHED Automatic Human Emotion Detection
AHED Automatic Human Emotion Detection
FISH IDENTIFICATION SYSTEM
Color-Attributes-Related Image Retrieval
15-5 Automated Fingerprint Identification System
Presentation transcript:

Medical Card System with Fingerprint Authentication Luvuyo Morris Supervisor: Mr. R. Dodds Co-Supervisor: Mr. M. Ghazi-Asgar Mentor: Mr. Roland Foster

 Overview of the project  High level design  Low level design  Methodology  Project plan  References Overview

 Fingerprint Authentication  Medical card system  How they fit?. Overview of the project

High level design

low level design

Low level design

Method 1 Fingerprint architecture Pre- processing Feature extraction Match Retrieve data

Testing Image Testing Training Image Train Use svm technique SVM Processing image Method 2

Feature Extraction Original image Thinned image

Feature Extraction Located Bifurcation and Termination

Term 1 Gather Requirements and Analysis learn to use: Open-CV image processing tools programming in C++ Research, analysis and understanding the project Term 2 Design and development of the prototype Design Low level design, High level design, Use-case. Develop fingerprint function (continues in term 3). Term 3 Coding the final application Implement the full fingerprint Authentication Develop smart card function and database Term 4 Testing and Evaluation Testing the application and debugging application Evaluate the application Project plan

 Changrui Xiao, Arthur Yu Medical Smart Card System for Patient Record Management  Anil K. Jain, Arun Ross, Salil Prabhakar,2004. An Introduction to Biometric Recognition.  Anil K. Jain, Jianjiang Feng, Karthik Nandakumar, 2010, Fingerprint Matching. References