Professional Documents
Culture Documents
Information Search and Analysis Skills (ISAS) Implementation of Advanced Encryption Standard (AES)
Information Search and Analysis Skills (ISAS) Implementation of Advanced Encryption Standard (AES)
Information Search and Analysis Skills (ISAS) Implementation of Advanced Encryption Standard (AES)
(ISAS)
Implementation of Advanced Encryption Standard (AES)
Praise and huge thanks to Allah for giving us blessings, health and ability to be able to
complete this ISAS, without any of it we probably won’t be able to accomplish it in
predetermined time. There are a few topic options that were put into consideration, but only
one catches our eyes, based on the implementation fingerprint security system theme that was
given, is Implementation of Fingerprint Security System on Fingerprint Screen Lock Redmi
Note 3.
Efforts are certainly needed in the process of making this assignment. We faced quite
a few difficulties but we managed to go through it by keep searching how to do this and that
over the internet, books, and even asking somebody who is well talented in the industry that
we asked for. From that lesson and on, we learned to always seek and ask information to
enhance more knowledge.
Authors
ii
CONTENTS
PREFACE..................................................................................................................................................................... ii
TABLE OF FIGURES.............................................................................................................................................. iv
CHAPTER I................................................................................................................................................................. 1
INTRODUCTION...................................................................................................................................................... 1
I.1 Background........................................................................................................................................................ 1
I.2 Writing Objective............................................................................................................................................. 1
I.3 Problem Domain............................................................................................................................................... 2
I.4 Writing Methodology...................................................................................................................................... 2
I.5 Writing Framework.......................................................................................................................................... 2
CHAPTER II................................................................................................................................................................ 3
BASIC THEORY........................................................................................................................................................ 3
II.1 Biometric.......................................................................................................................................................... 3
II.2 History FingerPrints....................................................................................................................................... 6
II.3 Fingerprint Recognition................................................................................................................................ 8
II.3.1 Fingerprint Patterns............................................................................................................................. 8
II.3.2 Fingerprint Readers.............................................................................................................................. 9
II.4 Fingerprint Identification Algorithm....................................................................................................... 12
CHAPTER III............................................................................................................................................................ 15
PROBLEM ANALYSIS......................................................................................................................................... 15
III.1 Fingerprint Screen Lock for Android..................................................................................................... 15
III.2 Using Fingerprint Screen Lock for Redmi Note 3.............................................................................. 16
III.2.1 Steps to use the Fingerprint scanner on Xiaomi Redmi Note 3......................................16
III.3 Security System of Fingerprint Screen Lock for Redmi Note 3......................................................18
III.4 Advantages and Disadvantages of Fingerprint App Lock for Android..........................................19
CHAPTER IV............................................................................................................................................................ 20
CONCLUSION AND SUGGESTION................................................................................................................ 20
IV.1 Conclusion.................................................................................................................................................... 20
IV.2 Suggestion.................................................................................................................................................... 20
BIBLIOGRAPHY.................................................................................................................................................... 21
iii
TABLE OF FIGURES
iv
CHAPTER I
INTRODUCTION
I.1 Background
Identity is a must which is owned by everyone. The current verification and
identification systems are increasingly used for various applications refer to the need for
security. Nevertheless, conventional methods are still widely used. Conventional methods are
generally divided into two categories: things that are known and something possessed.
Something which is known for example pins and passwords, while something that belongs
for example keys and cards. This method has weakness example by losing or forgetting that
can occur at any time.
Security is the important things to protecting data and electronic stuff. Imagine that
people are not protecting data and electronic stuff, absolutely all the things will be lose or the
other people will take it. All the things in these worlds have been handled by technologies.
Electronic lock is the one of example of the technology security. Actually, electronic lock has
any method to protecting a room. But in this paper writers want to explain about fingerprint
on smartphone as a method that use by electronic lock.
Main purpose of making this research paper is to introduce and explain to the reader
about implementation of fingerprint security system on Fingerprint Screen Lock redmin note
3, including:
1
2
The authors of the method used in the manufacture of these ISAS report is to
search material in the form of data from multiple sources and experiences, certain
internet sites, FAQ from the other who know Implementation of Fingerprint Security
System on Fingerprint Screen Lock Redmi Note 3, and from a variety of media to
support the author for the perfection of this paper.
Chapter I Introduction
This chapter will describe about the background of the topic, the writing
objectives, problem domain, the methodology of writing, and the writing framework.
BASIC THEORY
II.1 Biometric
Physical access control, say to a building, is generally based on locks and keys, on
badge readers or on few-digit pincodes which are easily lost or stolen by malicious
individuals. Because for access control based on keys or badges the authentication factor
is something you have, there is no real guarantee that the person entering your building is the
individual that was granted access in the first place. Unfortunately end users have to
remember such an amount of passwords and pincodes that they no longer apply good
password practices. End users tend to write passwords down, to keep new passwords as
simple as possible and to use always the same password.
With biometrics the access control factor is something you are, a measureable
physiological or behavioral characteristic, which is often more difficult to fake, steal or
immitate than a password or a key. Users don't have to remember it and they cannot by
accident leave it at home.
1. Fingerprint recognition
Fingerprint recognition refers to the automated method of identifying or confirming
the identity of an individual based on the comparison of two fingerprints or more.
4
5
1. Iris recognition
Iris recognition refers to the automated method of identifying or confirming the
identity of a subject by analyzing the random pattern of the iris.
2. Face recognition
Face recognition uses the spatial geometry of distinguishing features of the face It is a
form of computer vision that uses the face to identify or to authenticate a person. An
important difference with other biometric solutions is that faces can be captured from
some distance away, for example surveillance cameras.
3. Voice recognition
Voice recognition or speaker recognition refers to the automated method of
identifying or confirming the identity of an individual based on his voice. Beware the
difference between speaker recognition (recognizing who is speaking) and speech
recognition (recognizing what is being said).
Figure 2.1.4 Voice Biometric (REF: http://www.zrg.com)
5. Retina recognition
Retina recognition of a person is done by acquiring an internal body image, the retina
of a person. Unlike other biometric technologies retinal recognition is not widely
deployed in commercial applications. The retina is a thin layer of cells at the back of
the eyeball of vertebrates. It is the part of the eye which converts light into nervous
signals, The retina consists of multiple layers of sensory tissue and millions of
photoreceptors (cells) whose function is to transform light rays into neural impulses.
Ancient artifacts including carvings similar to friction ridge skin have been
discovered in many places throughout the world. Picture writing of a hand with ridge
patterns was discovered in Nova Scotia. In ancient Babylon, fingerprints were used on clay
tablets for business transactions. fingerprints already used since ancient times as both
business or the introduction of a person, the following will explain the history of the
development of the fingerprints.
1. BC 200s – China
Chinese records from the Qin Dynasty (221-206 BC) include details about using
handprints as evidence during burglary investigations. Clay seals bearing friction ridge
impressions were used during both the Qin and Han Dynasties (221 BC - 220 AD).
2. 1600-Europe
In a "Philosophical Transactions of the Royal Society of London" paper in
1684, Dr. Nehemiah Grew was the first European to publish friction ridge skin
observations. Dutch anatomist Govard Bidloo's 1685 book, "Anatomy of the Human
Body" also described friction ridge skin (papillary ridge) details.
In 1686, Marcello Malpighi, an anatomy professor at the University of Bologna, noted
fingerprint ridges, spirals and loops in his treatise. A layer of skin was named after
him; "Malpighi" layer, which is approximately 1.8 mm thick.
No mention of friction ridge skin uniqueness or permanence was made by Grew,
Bidloo or Malpighi.
8
4. 2016
The Unique Identification Authority of India is the world's largest fingerprint
(and largest multi-modal biometric) system, with over 820 million (82 crore)
fingerprint, face and iris biometric records. India's Unique Identification project is
also known as Aadhaar, a word meaning "the foundation" in several Indian languages.
Aadhaar is a voluntary program, with the goal of eventually providing reliable
national ID documents to most of India's 1.2 billion residents.
Arch is a pattern where the ridge enters one side of the finger, then rises in the center
forming an arch, and exits on the other side of the finger.
2. The Loop
Loop is the ridge enters one side of the finger, then forms a curve, and exits on the
same side of the finger from which it entered. Loops are the most common pattern in
fingerprints.
10
3. The Whorl
Whorl is the pattern when ridges form circularly around a central point. Refer to the
images on the right for examples of each pattern.
Fingerprint scanner engine will search these points and make a pattern by relating
these points. The pattern obtained from connecting points is what will be used to perform
matching when a finger is scanned. So, in fact the machine does not match the fingerprint
image, but matching the pattern obtained from the minutiae these minutiae. The points are
translated into a code number that is unique by using algorithms (mathematical process).
When reading the fingerprint is actually a unique code by comparing one with the other. If
the codes match, the print match, and the person gains access.
1. Optical readers
Optical readers are the most common type of fingerprint readers. The core of
the optical sensor is the CCD (Charge Couple Device), CCD is a silicon chip that is
made up of thousands and even millions of photo -sensitive diodes called photosites,
photodelements, also called pixels. Each photosite captures a single point of the
object, then assembled with other photosite catches into a single image. The type of
sensor in an optical reader is a digital camera that acquires a visual image of the
fingerprint.
2. Capacitive readers
3. Ultrasound readers
Ultrasound readers are the most recent type of fingerprint readers, they use
high frequency sound waves to penetrate the epidermal (outer) layer of the skin. They
read the fingerprint on the dermal skin layer, which eliminates the need for a clean,
unscarred surface. All other types of fingerprint readers acquire an image of the outer
surface, thus requiring hands to be cleaned and free of scars before read-out.
Figure 2.4.3 shows the process of recognition using method Back propagation. Here's a
description of the picture:
1. Data wear test fingerprint image
2. Test data taken directly from the scanner.
3. After the image was captured and converted into a binary threshold.
4. After that look for where the location of the fingerprint pattern and in –segment
characters.
5. Following that, Feature extraction using PCA.
6. Once the value of the PCA met, Enter also the value of PCA into file * .txt
desired amount of contribution. Then become a new hall mark features of the
test data.
7. If the new features of the database and data test PCA has been met then do an
introduction to the database with test data using Backpropagation method.
8. The introduction of the most sought-after value approach to be defined as the
output result of the introduction.
CHAPTER III
PROBLEM ANALYSIS
Fingerprint screen lock is a type of biometric security technology that utilizes the
combination of hardware and software techniques to identify the fingerprint scans of an
individual. A fingerprint scanner typically works by first recording fingerprint scans of all
authorized individuals for a particular system or facility. These scans are saved within a
database.
17
The user requiring access puts their finger on a hardware scanner, which scans and
copies the input from the individual and looks for any similarity within the already-stored
scans. If there is a positive match, the individual is granted access. The user can lock Screen
by Screen Lock function, User’s fingerprint is the key.
Fingerprint screen lock have several options for how to perform fingerprint matching,
such as by attaching a finger on the screen that has been specified is usually like a fingerprint
image (scan) and the capturing of fingerprint through a smart phone camera.
Fingerprint scanners can lock screen with the fingerprint. This smart phone brings on
great piece of security which lets user lock parts of user’s device rather than fully locking it
out. The following are steps fingerprint scanner application usage scan system:
3. Add fingerprint and stick behind the index finger on a fingerprint sensor , tap tap
continuously multiple times until the orange color is fully charged and it says Done.
Figure 3.2.1.3 Add fingerprint
4. If you have, then will be prompted to enter additional key form of pattern pin,
password choose a pattern for locks with patterns.
20
1. Perennial nature, that is strokes on fingerprints attached to human skin for life.
2. Immutability, that person's fingerprints never change, except getting a serious accident.
3. Individuality, fingerprint pattern is unique and different for each person.
Based on the nature of fingerprints , fingerprint used to be a protection tool that has
a good security system . Some of the smart phone security features complement the requested
pattern after running fingerprint features that will lock the screen, intended to facilitate the
use of smart phone users in case of errors in fingerprint matching pattern that has been set.
Then the user will be prompted to enter a pattern after several unsuccessful attempts to
perform fingerprint matching.
21
Advantage:
1. Safety when securing user’s screen with fingerprint locks, since no two people
have the exact same fingerprint.
2. Easy to use devices, the device used for capturing fingerprint image are intuitive
and easy to use.
3. Ability to enroll multiple fingers, if there some problem with one finger, the
fingerprint technology still can be used with the other 9 fingers, sometimes using
multiple finger improve the matching function.
4. Range of deployments environments, It can be used in any place where
biometric authentication or identification are needed.
Disadvantage:
1. Inability to enroll some users. About 2 % of the population have poor quality of
fingerprint, especially the elder people and manual worker. For these cases one
need to consider other biometrics or any other solution.
2. Performance deterioration over time. Although the fingerprint is a stable
physiological characteristic, it can suffer some small changes along the time and
therefore it can affect the performance of the whole system.
3. Android smart phone determine the quality of application performance in
conducting fingerprint matching fingerprint patterns.
4. Some Application has high tendency of others (hacker) to change the data in the
fingerprint that has been set as a key to lock apps.
CHAPTER IV
IV.1 Conclusion
IV.2 Suggestion
To use fingerprint technology, not all android can use this system directly, as some
kind of android need to install from Google Play Store the application to lock the app.
Fingerprint is a physiological characteristic of a stable, but the damage fingerprints
performance from time to time may experience some minor changes and therefore can affect
overall system performance.
To overcome this problem, it may be necessary to re-enroll fingerprints or use
multiple fingerprint enrollments. However, users should be wise in determining app
lock application that will be used on android because the performance of an
application that is different in some brands android.
22
BIBLIOGRAPHY
[1] Aplikasi Pemindai Sidik Jari “ScreenLocker” Gratis!! (n.d.). Retrieved November 2015,
from HpArea.com: http://hparea.com/aplikasi-pemindai-sidik-jari-screenlocker.html
[3] Cara Membuat Fitur Fingerprint Menggunakan Kamera di Android. (n.d.). Retrieved
November 2015, from http://ofamni.com/cara-membuat-fitur-fingerprint-menggunakan-
kamera-di-android/
[11] Technopedia TM. (n.d.). Retrieved November 2015, from Fingerprint Scanner:
https://www.techopedia.com/definition/29808/fingerprint-scanner
23
24