Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
3 views18 pages

CPP GRP7

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 18

MVPS’s

RAJARSHI SHAHU MAHARAJ POLYTECHNIC,

NASHIK

DEPARTMENT OF INFORMATION TECHNOLOGY

ACADEMIC YEAR 2024-2025

“CAPSTONE PROJECT PLANNING”


(22058)

PROJECT ON
“E-Passport using RFID and Biometrics”

GUIDED BY
Mrs. R. V. Shinde

SUBMITTED BY

SR. ROLL ENROLLMENT EXAM


STUDENT NAME
NO NO NO SEATNO
1 10 2210020216 427953 Dhanapune Aatmaja Dilip
2 16 2210020224 427959 Ghotekar Sakshi Arun
3 23 2210020230 427964 Kharat Payal Sanjay
4 56 23611630480 428000 Barphe Aastha Nishikant
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

Certificate
This is certify that Ms. /Mr. _________________________________Roll No.__ of Fifth

semester of diploma in Information Technology of Institute MVPS’s Rajarshi Shahu

Maharaj Polytechnic, Nashik (Code: 1002) has successfully completed micro-project in

“Capstone Project Planning”(22058) for academic year 2024-25 as prescribed in

curriculum of MSBTE, Mumbai.

Place: Nashik Enrollment no:

Date: Exam seat no:

Mr. A. P. Patil Ms. M. B. Patil Prof. Prashant Patil


Course Teacher/Guide H.O. D Principal

Seal of
institute
INDEX

SR.NO. CONTENT PAGE NO.

1 Introduction 1

Chapter no.1
2 3
Literature Survey

Chapter No.2
3 5
Methodology

Chapter no.3
4 7
System Architecture

Chapter No.4
5
Advantages And Disadvantages

6 Conclusion

7 References
LIST OF FIGURES

Fig. Figure Name Page No.


No
1 System Architecture 7

2 Block Diagram 7
3 Arduino Uno board 9
4 Fingerprint Scanner 9
5 RFID Scanner/Reader 9
ABSTRACT

Advancements in technology have created the chance of larger assurance of correct


travel document possession, however, some issues relating to security and effectiveness stay
unaddressed. Electronic passports have notable a good and quick readying all around the
world since the International Civil Aviation Organization the globe have adopted standards
whereby passports will store biometric identifiers. The employment of life science for
identification has the potential to create the lives easier, and therefore the world folks board a
safer place. The aim of biometric with RFID Tag suggests that e-passports are to stop the
misappropriated entry of a person into a selected country and limit the employment of
counterfeit documents by a lot of correct identification of a person. This paper analyses the
fingerprint biometric e-passport style. These papers concentrate on the privacy and private
security of bearers of e-passports, the particular security profit countries obtained by the
introduction of e-passports victimization fingerprint recognition systems. The research
worker analyzed its main crypto graphical features; the fingerprint life science presently used
with e-passports and regarded the encompassing procedures. Research worker- centered on
vulnerabilities since anyone willing to bypass the system would select a constant approach.
On the contrary, only wishing on them could create a risk that didn’t exist with previous
passports and border controls. The paper conjointly provides a security analysis of the e-
passport victimization fingerprint biometric with RFID tags that are supposed to produce
improved security in protective biometric info of the e-passport bearer.

Keywords: E-Passport, RFID Tag, RFID Reader.


INTRODUCTION

Advancements in technology have created the chance of larger assurance of correct


travel document possession, however, some issues relating to security and effective- ness stay
unaddressed. Electronic passports have notable a good and quick readying all around the
world since the International Civil Aviation Organization the globe have adopted standards
whereby passports will store biometric identifiers. The employment of life science for
identification has the potential to create the lives easier, and therefore the world folks board a
safer place. The aim of biometric with RFID Tag suggests that e-passports are to stop the
misappropriated entry of a person into a selected country and limit the employment of
counterfeit documents by a lot of correct identification of a person. This paper analyses the
fingerprint biometric e- passport style. These papers concentrate on the privacy and private
security of bearers of e-passports, the particular security profit countries obtained by the
introduction of e-passports victimization fingerprint recognition systems. The research
worker analyzed its main crypto graphical features; the fingerprint life science presently used
with e-passports and regarded the encompassing procedures. Research worker- centered on
vulnerabilities since anyone willing to bypass the system would select a constant approach.
On the contrary, only wishing on them could create a risk that didn’t exist with previous
passports and border controls. The paper conjointly pro- vides a security analysis of the e-
passport victimization fingerprint biometric with RFID tags that are supposed to produce
improved security in protective biometric info of the e-passport bearer. An E-Passport is an
ID document that possesses connected biometric data of its bearer. It’s embedded in the RFID
tag that is accomplished by crypto graphical practicality. The triple-crown implementation of
biometric techniques in documents like E-Passports aims to the strength of border security by
decreasing the chance of the document's holder. The e-passport additionally offers substantial
edges to the rightful holder by providing a lot of refined suggests that of confirming that the
passport belongs thereto person which it's authentic, while not privacy. The states square
measure presently supplying e-Passports, which corresponds to quite five-hundredths of all
passports being issued worldwide. This represents an excellent sweetening in national and
international security because it improves the integrity of passports by the one written within
the document and to the physical characteristics of the holders, and permits machine-assisted
verification of biometric and account data to verify the identity of travelers.

 PROBLEM STATEMENT
The traditional paper-based passport system faces challenges in ensuring security,
authenticity, and efficiency, leading to concerns about identity theft, counterfeiting, and
lengthy border control processes. To address these issues, an E-Passport system utilizing
RFID and biometric technologies can provide a secure, efficient, and reliable solution.
However, integrating these technologies poses challenges, including ensuring data privacy
and security, preventing unauthorized access, and maintaining accurate biometric
identification. Moreover, the system must comply with international standards and
regulations, such as those set by the International Civil Aviation Organization (ICAO). This
project aims to design and develop a secure, efficient, and user-friendly E-Passport system
leveraging RFID and biometric technologies to enhance border control processes and ensure
the integrity of identity documents.
 GOALS AND OBJECTIVES

The objectives are as follows:


 To analyze and determine the advantages of e-passport.
 To make recommendation on improvement on the current used passport.
 To design and construct an RFID and biometric passport system prototype.
 To develop an e-passport system using RFID cards.
 Prevent counterfeiting, tampering, and identity theft.
 Automate identity verification processes.
 Enable faster and more convenient travel for legitimate travelers.
 Ensure the integrity of identity documents.
 Adhere to international regulations for travel documents.
 Enhance border control processes with automated and accurate identity verification.
 Enable seamless travel across international borders.
CHAPTER NO. 1
LITERATURE SURVEY

SR PUBLIC
PUBLISH
NO. PAPER TITLE CONFERENC REMARK
YEAR
E JOURNAL

1. E-passport system 2022 International advanced They highlighted the


Integration secure a research journal in vulnerabilities of existing e-
IOT & wireless science, engineering passport system including
Communication and technology security risks &limited data
storage capacity. The proposed
technology
system aims to improve the
efficiency identify verification
process enabling seamless &
reliable travel experience. The
study contributes to the
development of a more robust
&
secure e-passport system
addressing the limitations of
existing solutions.

2. Biometric based RFID tag 2018 International advanced The protocol integrates
mutual authentication research journal in biometric authentication with
protocol to prevent science, engineering RFID technology to provide a
illegaltimate access and technology
robust means of verifying tag
&ensure secure data
authentity and preventing
transaction
unauthorized access. The
study demonstrated the
effectiveness of the proposed
protocol is preventing
common. RFID attacks, such
as tag cloning& unauthorized
access & ensuring securing
data transaction in various
application including passport
verification &
border control

3 ePassport:Enhancing 2012 International advanced The authors focus on global


Security in Global research journal in trends in ePassport adoption,
Mobility science, engineering particularly the use of RFID
and technology and biometric (fingerprint)
data for secure border control
and travel facilitation. They
explore different encryption
techniques and propose ways
to enhance both security and
the convenience of travelers.

4. Privacy and Security in 2014 International advanced This paper highlights how
RFID-Based ePassport research journal in biometric data such as
Systems: The Case for science, engineering fingerprints can enhance the
Biometric Protection and technology
security of RFIDbased
ePassports. The authors
discuss potential attacks on
biometric data and propose
advanced encryption protocols
and secure storage methods for
protecting this data.
CHAPTER NO. 2
METHODOLOGY

1)RFID Technology:
Radio Frequency Identification (RFID) is an automatic identification method whose concept
is based on retrieving data from radio waves embedded onto a label-style material using
devices called RFID tags or transponders, Readers, and antennas. The RFID technology is
used in many different Identification systems in the form of barcodes and embedded chips.
The RFID tag is a small microchip designed for wireless data transmission. It contains the
same information as a passport's data page—the passport holder's name, nationality, gender,
date of birth, place of birth and digitized photo. RFID tags can be one of two types: active or
passive. Active tags are those which are run by battery, while passive does not have batteries.
So they supply their power by using the power obtained from radio signals emitted by the
RFID readers to operate. To read the information on the chip, the RFID reader energizes the
chip circuitry by wirelessly emanating power and communicating through its antenna which
is usually built into the RFID Reader and the RFID Tag to improve the signal. The designed-
in operation vary of the chip electronic equipment is incredibly small; it should be command
among ten centimetres of the reader.

RFID System:
Basically RFID (Radio Frequency Identification) is a wireless link to uniquely identify
objects or people. RFID enables iden- tification from a distance without requiring line of
sight. The RFID sys- tem comprises the RFID tag/card, RFID reader, backend database
and a control unit. RFID systems have two broad categories passive and active. The RFID
reader communicates with the RFID tag through tag interro- gation.

i. RFID Tags/Card:
RFID tags/cards consist of an Integrated circuit at- tached on an antenna that is printed,
etched or stamped onto a base which is often a paper substrate of Polyethylene
Terephthalate (PET). The inlay which is the combination of the chip and antenna is then
inserted amid the printed label and its adhesive backing or it is either placed in a more
durable structure.

ii. RFID Reader:


The RFID reader is also known as an interrogator, it provides the connection between the
tag data and the software that needs the information.

iii. Working Principle of an RFID based e-passport:


In the e-passport prototype this RFID system will enable details of a passport holder to be
stored in a portable device called and RFID card. This RFID card will be read by an RFID
reader and processed in order to identify the holder of this e-passport RFID tags are
categorized as either active or passive. Active RFID tags are powered by an internal battery
and are typically read/write, i.e., tag data can be rewritten and/or modified. An active tag’s
memory size varies according to application requirements; some systems operate with up to
1MB of memory Passive RFID tags operate without a separate external power source and
obtain operating power generated from the reader.This project uses passive tags. Read-only
tags are typically passive and are programmed with a unique set of data (usually 32 to 128
bits) that cannot be modified. The reader has three main functions: energizing, demodulating
and decoding. The antenna emits radio signals to activate the tag and to read and write data to
it.

2)Biometrics:
Biometrics is the automated measurement of biological or behavioral features that identify a
person The major components of biometric system used in E- passport are:
i. Capture
ii. Extract
iii. Create Template
iv. Compare
The fingerprint recognition technique is used to implement and realized this project.

3)Fingerprint Recognition:
A fingerprint is a pattern of ridges and furrows located tips of each finger. Compact sensor is
used to obtain digital images of these patterns. In fingerprint recognition the initial image is
compared with live scan image of the finger by direct contact with a reader device.A
fingerprint in its slender sense is a control left by the friction ridges of a personality's finger.
In a wider use of the term, fingerprints are the traces of control from the friction ridges of any
a part of a personality's or different primate hand. A print from the foot may leave control of
friction ridges. A friction ridge could be a raised portion of the cuticle on the digits (fingers
and toes), the palm or the only of the foot, consisting of one or more connected ridge units of
friction ridge skin. These are usually referred to as "epidermal ridges" that are caused by the
underlying interface between the dermal papillae of the derma and also the interpapillary
(rete) pegs of the stratum. These dermal ridges serve to amplify vibrations triggered, for
example, when fingertips brush across Associate in a nursing uneven surface, better
transmitting the signals to sensory nerves involved in fine texture perception. These ridges
conjointly assist in fascinating rough surfaces, as well as smooth wet surfaces.
CHAPTER NO.3
SYSTEM ARCHITECTURE

Fig1:System Architecture
The E-Passport system architecture comprises several components: RFID tags (E-Passports),
RFID readers, biometric authentication (fingerprint scanning), and a secure database. The
system operates as follows: the Admin (passport officer) registers user details, captures
fingerprints, and assigns RFID tags (E-Passports) through the registration module. The RFID
tags store user data, including biometric information and journey details. The passport
checker uses an RFID reader to scan the RFID tag and authenticate the user's fingerprint,
granting access to view journey details. The Police department and Government hospitals
have separate modules to update user crime records and medical records, respectively. Users
can access their journey details and book new journeys through a user portal. The system
employs a secure database to store and manage user data, ensuring confidentiality and
integrity. The architecture enables real-time verification, secure data storage, and authorized
access, providing a robust and efficient E-Passport system.
Fig2:Block Diagram
The existing E-Passport system utilizes a combination of RFID and biometric
technologies to enhance identity verification processes. The current system consists of a
passport booklet containing a contactless RFID chip, which stores the holder's biographic and
biometric data, such as fingerprints and facial recognition information. At border control
points, RFID readers are used to wirelessly read the data stored on the RFID chip, and the
biometric data is compared with the individual's live biometric scan to verify their identity.
However, the existing system has limitations, including security vulnerabilities, data storage
capacity constraints, and compatibility issues with international standards. Additionally, the
current system lacks advanced features, such as real-time data updates, secure data
encryption, and seamless integration with other identity verification systems. The existing
system requires enhancement to address these limitations and ensure a more secure, efficient,
and reliable identity verification process.

System Necessity
Hardware:
1. Processor – i3
2. Hard Disk – 5 GB
3. Memory – 1GB RAM
4. Arduino Uno Board
5. Fingerprint Scanner
6. RFID Reader /Scanner
Software:
1.Operating System:Windows XP and later versions 2.Front & Back End:HTML,CSS .
3.Programming Language: Java,Embedded.
4.Database:MySql.
5.Domain:Image Processing

1)Arduino Uno board


These days many people try to use the arduino because it makes things easier due to the
simplified version of C++ and the already made Arduino microcon- troller that you can
programme, erase and reprogramme at any given time. It is a microcontroller board based on
the ATmega 328P. It has 14 digital pins, 6 analogue inputs, a 16MHz quartz crystal, a USB
connection, a power jack, an ICSP header and a reset button. Fig 2-5 shows a typical Arduino
Uno board. One has to simply connect it to a computer with a USB cable or power it with an
AC-to-DC adapter or battery to get started.
Fig3:Arduino Uno board

2)Fingerprint Scanner
To scan biometrics we are using fingerprint sacnner.Fingerprint scanners have unique patterns
that can be used to distinguish one scanner from another one. The pattern, which we call
scanner pattern, stems from the variability of device characteristics at silicon level and is
caused by imperfections of the conversion from the input to the scanner (i.e., the object
applied to it) to its output (i.e., the digital image).

Fig4: Fingerprint Scanner


3)RFID Scanner/Reader
The RFID reader is also known as an interrogator, it provides the connection between the tag
data and the software that needs the information.

Fig5: RFID Scanner/Reader


CHAPTER NO.4
ADVANTAGES AND DISADVANTAGES

 Advantages:
 Helps to detect counterfeit or manipulated documents
 Confirms the identify of the individual
 The increasing threat of identity fraud requires a strengthening of security features
in passports
 The use of biometric information to link a person to a passport can help to counter
identify fraud
 Biometric verification can be used at border controls and to verify the image on a
passport renewal application against images held on record.
 No physical documents
 Identification process requires online connection to User
 Identification doesn’t require additional data sources (flight data etc.)
 Tags can be read only as well as read/write unlike barcodes

 Disadvantages:
 RFID systems are often more expensive than barcode systems
 RFID tags are usually larger than barcode labels
 More than one tag can respond at the same time

CONCLUSION
In conclusion, the integration of RFID and biometric technologies in E-Passports offers
a robust solution for enhancing identity verification processes, ensuring secure, efficient, and
reliable travel. The proposed system addresses the limitations of the existing system,
providing advanced security features, increased data storage capacity, and seamless
integration with international standards. By leveraging RFID and biometric technologies, the
E-Passport system minimizes the risk of identity fraud, reduces processing times, and
enhances the overall travel experience. As the world becomes increasingly interconnected,
the adoption of E-Passports with RFID and biometric technologies is crucial for maintaining
national security, facilitating international travel, and ensuring the integrity of identity
documents. The successful implementation of this system has far-reaching implications for
the future of identity verification, paving the way for a more secure, efficient, and globalized
world.

REFERENCES
1) Vignesh, T., K. K. Thyagharajan, and R. Beaulah Jeyavathana. "An improved Epassport
system with secured IoT and wireless communication technology." In AIP Conference
Proceedings, vol. 2452, no. 1, p. 060001. AIP Publishing LLC, 2022.
2) Prof. Snehal Honade, Ayesha Sarwar, Suyog Kanawade, Akshay Hawle,” Electronic
Passport using RFID”, International Journal of Innovative Science and Research
Technology, ISSN No: -2456 –2165, Volume 3, Issue 2, pp 610-613, February – 2022
3) Al-Ajeely, Y. H. N. "Passport Verification System Development Via IOT Equipment."
Yanka Kupala State University of Grodno, Republic of Belarus, ISSN No: 2349-6002 ,
Volume 7, Issue 2, pp 476-482,(2022).
4) Kumar, VK Narendira, and B. Srinivasan, "Biometric passport validation scheme using
radio frequency identification." International Journal of Computer Network and
Information Security 5, no. 5 (2021): 30.
5) Nirmala.M, Gayathri.R, Keerthana.R, Deepika.M,” EPassport Verification System”,
International Journal of Innovative Technology and Exploring Engineering, ISSN: 2278-
3075, Volume-9 Issue-6, pp 1775-1777, April 2020.
6) Deepthi M, Dr U Eranna, “RFID and IoT Electronic Passport Verification System”,
International Journal of Innovative Research in Technology, ISSN No:2349-6002,
Volume 7, Issue 4, pp 336-369, September 2020
7) Hussain, Mohamed Arusham, Maen T. Alrashdan, and Qusay Al-Maatouk. "SECURE
BIO-RFID SYSTEM IN ORGANIZATIONS." International Journal of Management
(IJM) 11, no. 11 (2020).
8) Keerti Srivastava, Amit K. Awasthi andR.C.Mittal Biometric based RFID tag mutual
authentication protocol defending against illegitimate access -2018, Malaya Journal of
Matematik[102-106].

You might also like