基于DSP指纹识别系统设计 中英文摘要

合集下载

基于dsp的指纹识别系统研究

基于dsp的指纹识别系统研究

1 绪论1.1 选题研究背景1.1.1 生物识别生物特征识别技术是指通过计算机利用人体固有的生理特征或行为特征之间的差异来进行个人身份鉴别和认证的一种技术。

生物特征分为身体特征和行为特征两类。

身体特征包括指纹、掌纹、手形、脸型、人体气味、虹膜、视网膜、耳廓、骨骼和DNA等先天特性;行为特征则包括笔迹、声音、步态、击键动作等习惯特性。

生物识别技术最大的特点无非三个方面:高唯一性、高安全性和高便捷性。

而这三个特点其实正是信息安全从业者不懈追求的目标。

围绕这三个特点,生物识别技术出现两大应用前景最为广阔的区域:一是由其高安全性和唯一性,在有高机密防护需求的国家涉密系统等领域的发展;二是凭借其便捷性和唯一性,在大众社会化领域的智能化应用。

随着计算机技术的迅速发展以及不断提升的信息安全保障需求,生物特征识别技术在各类信息系统中得到越来越广泛的应用,并将为保障信息安全发挥越来越重要的作用。

1.1.2生物识别种类生物识别是依靠人体的身体特征来进行身份验证的一种解决方案。

根据生物特征识别技术采用不同的生物特征,广泛应用的生物特征识别技术有:指纹识别、人脸识别、虹膜识别、语音识别、视网膜识别、掌形识别、基因识别和签名识别等。

其各自的特征如下综述:(1)指纹识别[1][2]:指纹在我国古代就被用来代替签字画押,证明身份。

指纹是人与生俱来的身体特征,大约在14岁以后,每个人的指纹就已经定型,指纹具有固定性,不会因人的继续成长而改变。

指纹也具有唯一性,不同的两个人不会具有相同的指纹。

谈及指纹识别,我们接触最多的技术词汇就是拒真率与认假率,所谓拒真就是系统中有该枚指纹数据却被拒绝,所谓认假就是系统中没有该枚指纹数据却被接受。

其实,在实际应用中,我们遇到的问题主要不是拒真率与认假率,而是拒登率(无法使用指纹识别的用户率)。

在所有生物识别技术中,指纹识别是目前最成熟、最方便、可靠、无损伤、价格便宜和应用最广泛的生物识别技术。

基于DSP的指纹生物特征识别系统的设计课程设计说明书 推荐

基于DSP的指纹生物特征识别系统的设计课程设计说明书 推荐

目录目录 (1)摘要 (2)1、任务提出与方案论证 (3)1.1任务提出 (3)1.2 方案论证 (3)2、总体设计 (4)2.1 指纹识别系统原理 (4)2.2 指纹采集与指纹图像处理方法 (4)3、详细设计 (6)3.1 硬件设计 (6)3.1.1 DSP 处理器与FPS200 指纹检测芯片相连 (9)3.1.2 DSP 存储空间扩展 (10)3.1.3 扩展串行通信口 (13)3.1.4 其他电路设计 (14)3.2.软件设计 (17)总结与致谢 (21)参考文献 (22)附录 (22)摘要指纹识别技术通过分析指纹的局部特征,从中抽取详尽的特征点,从而可靠地确认个人身份。

指纹识别的优点是指纹作为人体独一无二的特征,它的复杂度可以提供用于鉴别的足够特征,具有极高的安全性。

相对于其他身份认证技术,指纹识别是一种更为理想的身份认证技术,指纹识别不仅具有许多独到的信息安全优点,更重要的是具有很高的实用性、可行性,已经广泛应用于金融、电子商务以及安全性能要求教高的行业中。

针对指纹的唯一性和终身不变性的特点.提出了一种基于FPS200固态指纹传感器和TMS320VC5402 DSP芯片的快速指纹识别系统,促使指纹识别设备向小型化、嵌入式、自动化方向发展;对系统的组成原理、指纹采集和指纹图像处理力法进行了分析;结合FPS200和TMS320VC5402芯片的特性,对系统硬件核心和图像采集电路做了详细介绍,并给出系统硬件设计方案、软件设计流程;实验结果表明.系统指纹采集效率高,识别速度快,识别结果准确可靠;该系统性能稳定.实用性强,应用范围广泛。

关键词: TMS320VC5402;DSP;指纹识别;FPS2001、任务提出与方案论证1.1任务提出指纹作为人体的重要特征,具有长期不变性和唯一性已经成为生物识别领域的重要手段。

通过指纹特征来鉴别人的身份的技术正在得到越来越广泛的应用。

随着指纹检测技术和指纹识别算法的不断改进,指纹识别技术还将在越来越多的部门得到更广泛的应用。

指纹门禁系统英文文献

指纹门禁系统英文文献

中英文对照外文翻译(文档含英文原文和中文翻译)原文:Intelligent Entrance Guard SystemIntelligent entrance guard and safety management system is a new type of modern safety management system, which combines the microcomp uter automatic identification technology with the modern safety manag ement practices into an organic whole. It contains lots of new techno logies such as the electronic, mechanical, optical, computer technolo gy, communication technology, biotechnology, and so on. It is an effe ctive measures to achieve the goal of implementing safety management at the inward and outward of important departments. It can be applied to all kinds of confidential departments, such as banks, hotels, gen eratorrooms,the armory, confidential rooms, offices, intelligent commun ities, factories etc. With the rapid development of digital technolog y and network technology today, access control technology finally get s the good chance to develop rapidly. Entrance guard system has far t ranscends the pure doorway and key management.It has gradually develo ped into a set of complete access management system.1 The Development of Entrance Guard SystemInward and outward entrance guard system just as its name implies is a control system of managing the inward and outward channels, whi ch is developed on the basis of the traditional door lock. The tradit ional mechanical lock is just a simple mechanical device, so no matte r how reasonable the structural is designed, how strong the material is made, people can always open it through various means. Key managem ent is very troublesome in places like offices and hotel rooms where so many people entering and leaving the passageway. Whenever the keys are lost or employees are replaced, locks and keys must be renewed. In order to solve these problems, electronic card lock and electronic trick lock are invented. These two kinds locks’ appearance raised t he management level of inward and outward channels from a certain ext ent and has impelled the channel management to enter the electronics era. But with the continuous application of these two kinds of electr onic locks, the defects of themselves are gradually exposed. The prob lem of magnetic card lock is the easy replication of the information, a greater degree of wear between card and card reader, high failure rate and low safety factor. The problem of combination lock is that t he password is easy to leak and we do not have even any small clue to investigate with, so the safety coefficient is very low. At the same time, it is easy to be unlocked by people outdoor because most of th e reading card (password) and the control part is installed together outside the door at this period. Entrance guard system in this period have remained in its early immature stage, so the entrance guard sys tem is usuallyreferred to as electronic locks, which has not been widely applie d. With the development of inductive card technology and the biologic al recognition technology in recent years, the entrance guard system has got a leap-style development and has entered into the mature peri od. they have their special strong points in various aspects like saf ety, convenience, manageability, etc. The application fields of entra nce guard system is becoming more and more abroad.2 Function of Entrance Guard SystemBasic functions realized by mature entrance guard system: 2.1 The management of the channel access permissions.·Access permissions are set to formulate who can pass in and out each channel and who can't.· The way to pass in and out the channel means to scope out the a uthorization of the way to pass in and out to people who can pass in and out the channel. The ways to pass in and out includes entering pa ssword, reading the card(biometric), reading the card(biometric) plus entering password.· Access time means to set the range of tim e during which people who have the permission can pass in and out. 2.2 The function of real -time monitoringSystem administrators can keep a watchful eye on the situation ofpeople passing in and out of each gate region(there are photos as well at the same time) and the situation of each gate region(includi ng the door switch, warning in various kinds of abnormal conditions) through the microcomputer in real-time; they can also open and close all the door area in emergency conditions.2.3 Function of querying records of in and out:System can store all the in and out records, status. You can quer y the records and status according to different querying conditions. It is equippedwith corresponding attendance software so as to realize the purpo se of checking-in and guarding with one piece of card. 2.5 Function o f abnormal alarming:It can realize microcomputer alarm or alarm with siren in excepti onal cases, such as: illegal intrusion, not closing the door overtime, etc.It can also implement the following special features according to different entrance guard system:Fire alarm monitoring linkage function: The entrance guard system can automatically open all the locks to let the people inside to esc ape at any time in the event of a fire alarm.Automatic monitoring linkage commonly refers to the monitoring sy stem which will record the situation at that time and the warning con dition when someone charges (valid/invalid).Settings, managing and monitoring functions of the network : most of the entrance guard system can only use a microcomputer management, but advanced technology of the system can set, monitor, query and ma nage the whole system at any location which has been authorized in th e network. It also can set, manage, query and monitor in a different place through the INTERNET.Function of open the door logically: Simply put is that several p eople have to swipe the cards through the same door at the same time (or in other way) so that the electronic door lock will open. 3 Appli cations of Intelligent Entrance Guard System3.1 Application of Entrance Guard in The Work of The Companies in side The Intelligent Office Buildings:Doors installed with entrance guard on the door in the companies can effectively prevent the foreign salesman to disturb the order of office, and also can prevent foreign sundry to enter the company effe ctively , and then ensure the safety of the company property and thei r employees. You can display and improve the company's management lev el and improve the corporate image. Itcan also track whether the employees leave the company without ap propriate reasons. You can check on work attendance by using the atte ndance management software without buying time recorder. The results are more objective and fair and faster with higher accuracy rate. It can reduce the power and amount of work of personnel department. It c an effectively solve the problem that the employees have to change th e keys of the front gates due to fear. You can arrange the limites of authorities and door-open time flexibly. Workers just need to take o ne piece of card without adorning a large number of heavy keys and it is safer than keys.You can avoid the materials and documents in the leaders’ office been leaked by others and give the leaders a more secure and private environment by install entrance guard system on the door of the leade rs’ office. you can guarantee the core technology and data not been stolen easily by outsiders and prevent the employees of other departm ents from entering this department to disturb the developing work by installing entrance guard system in the development of technical depa rtment. You can guarantee the security of the property and the safety of the company's financial information by installing entrance guard system in financial department. You can prevent the other person from entering into the production workshop effectively and avoid causing safety problems by installing entrance guard system in the production workshop gate.3.2 Applications of in and out Management Control in The Intellig ent CommunityGenerally installed entrance guard system in the cell gates, elec tric gates, unit of steel fire doors, security doors can effectively stop other workers from entering into the community and conduct the c losed-end management in the community effectively. It can also change the old inaccurate and less rigorous management style of community s ecurities who distinguish whether he or she is an outsider just rely on their memory. If the new security guards stop the new residential, it will annoying them. If outsiders wear very well, the security gua rds will consider them the residential and let them in without any qu estion, which will bring potential safety hazard.The entrance guard s ystem of safety science and technology can improve the level of prope rty and it is better for developers to promote property. Owners will also benefit from the scientific and effective access of management. Networking entrance guard is advantageous to the security of monitori ng all the situation of in and out of the door at any time. If there are accidents or cases, it can provide evidence when the police later query the records.You can combine it with intercom system with visual intercom syst em. You can combine it with internal consumption IC card and parking management implementation into one card.3.3 Applications of Entrance Guard in The Government Offices:It can effectively standardize the order of office and prevent il legal personnel shocks to government offices, protecting personal saf ety of leaders. 3.4 The Application of Entrance Guard in Telecom Base Station and Substation Power Supply Bureau:Typical base station and substation power supply bureau has such characteristics: many base stations, big system capacity requirements, large distribution range or even hundreds of square kilometers. It h as its own network connected to the Internet. In some places it is ev en unattended, which needs the central dispatching room scheduling st aff flexibly at any time. Implementation scheme is to use the network entrance guard controller, to realize remote management through the LAN or the Internet. 3.5 Application of Entrance Guard in intelligent elevator control:It is also known as access control elevator, elevator card, IC ca rd elevator, which only authorized users can have the right to recall the elevator and choose hall according to the floor. More and more i ntelligent communities have been using relate equipments. The intelli gent control system of science and technology of Shenzhen has develop ed specially elevator control entranceguard control system form designing a proprietary elevator entran ce guard control system.中文译文:智能门禁系统智能门禁安全管理系统是新型现代化安全管理系统,它集微机自动识别技术和现代安全管理措施为一体,它涉及电子,机械,光学,计算机技术,通讯技术,生物技术等诸多新技术。

《基于TMS320VC5402DSP的指纹识别模块的研究》

《基于TMS320VC5402DSP的指纹识别模块的研究》

《基于TMS320VC5402DSP的指纹识别模块的研究》一、引言随着科技的飞速发展,生物识别技术已成为现代社会安全验证的重要手段。

其中,指纹识别技术以其独特性、稳定性和便捷性,得到了广泛的应用。

TMS320VC5402DSP(Digital Signal Processor)作为一款高性能的处理器,其在指纹识别模块中的应用,能够极大地提高指纹识别的效率和准确性。

本文将基于TMS320VC5402DSP的指纹识别模块展开研究,探讨其工作原理、性能特点及实际应用。

二、TMS320VC5402DSP概述TMS320VC5402DSP是一款由德州仪器(TI)公司生产的数字信号处理器,具有高性能、低功耗、高集成度等特点。

其强大的数据处理能力和灵活的配置,使得它在指纹识别模块中发挥着关键作用。

该处理器能够快速地处理指纹图像,提取特征信息,为指纹识别提供强大的支持。

三、指纹识别模块工作原理基于TMS320VC5402DSP的指纹识别模块主要包括指纹图像采集、预处理、特征提取和匹配四个部分。

1. 指纹图像采集:通过高精度的指纹传感器,将指纹信息转化为数字信号。

2. 指纹图像预处理:对采集到的指纹图像进行去噪、增强等处理,以便后续的特征提取。

3. 特征提取:利用TMS320VC5402DSP强大的数据处理能力,从预处理后的指纹图像中提取特征信息,如纹线方向、纹线宽度等。

4. 特征匹配:将提取的特征信息与数据库中的指纹信息进行比对,以完成身份验证。

四、指纹识别模块性能特点基于TMS320VC5402DSP的指纹识别模块具有以下性能特点:1. 高精度:高精度的指纹传感器保证了指纹信息的准确性。

2. 高效率:TMS320VC5402DSP强大的数据处理能力,使得指纹识别的速度大大提高。

3. 抗干扰能力强:指纹识别模块具有较好的抗干扰能力,能够在复杂的环境下稳定工作。

4. 安全性高:通过特征匹配完成身份验证,具有较高的安全性。

基于dsp的指纹识别系统

基于dsp的指纹识别系统
课题演示 基于DSP的指纹识别系统
组长: 小组成员:
2014
2020/4/3
1
目录
CONTENTS
2020/4/3
一、概述
二、硬件电路设计
1、需求分析
2、硬件整体结构
3、硬件选择
4、电路原理图
三、软件设计
1、指纹识别算法流程
2、指纹识别程序框图
3、指纹识别算法实现
4、指纹识别调试
四、总结
2
一、概述
2020/4/3
11
MCU的选择
由于考虑到以下因素:
1、指纹识别算法复杂度大,系统必须具备复杂运算的 能力。
2、识别过程运算量大,系统需具备快速运算能力,以
满足实时性的要求。
3、系统必须低功耗、稳定性高、性价比高等因素。 4、 芯片量产情况以及相关技术的成熟度。
综合考虑,选择该芯片:TMS320VC5402芯片
2020/4/3
9
硬件整体结构 ()



USB



电源、时钟、 JTAG仿真调试模块 复位模块
MCU
CPLD
指纹采集 传感器
FLASH SRAM 存储器
液晶屏显示
2020/4/3
10
主硬件选择及方案 ()
1、MCU
2、指纹采集传感器 3、电源 4、复位电路 5、存储器扩展 6、LCD显示模块
能力且具有较大的数据存储空间。
为满足该需求,硬件电路中必然要存在内存扩展电路, 例如数据存储器的扩展。同时还应该考虑内存的读写性 能。
(4)系统的功耗、稳定性、价格都有严格的要求。
为满足该需求,应加入复位电路、时钟电路、调试

基于DSP的自动指纹识别系统

基于DSP的自动指纹识别系统

领域——通信电子、 信号处理、 自动控制、 雷达 、 军
事、 航 空航 天 、 医疗 、 家用 电器 、 电 力 电子 , 而 且 新
的应 用领域 还 在不 断地 被 发 现 、 拓展 。可 以说 , 基
系统的结构框图如图 1 所示。系统的硬件功能模
块主要 包 括 指 纹采 集 模 块 、 D S P指 纹 图 像 处 理 识 别模块 、 存 储模 块 、 以及 电源模 块 。 系统 工作 原理 : DS P 5 5 0 9 A通过 S P I 接 口实 现 对
D S P ) 是 一种 专 门为实 时 、 快 速 实 现各 种 数 字 信 号
TMs 3 2 0 VC 5 5 O 9 A是 T I 公 司生产 的高 性 能 、
低功耗 1 6 位定点数字信 号处理器。其处理 速度 4 0 0 MI P S , 最高工 作频率 2 0 0 MHz ; 双核结 构 ; 片
( 安徽 阜 阳 2 3 6 0 3 7 ) 。
基金项 目: 安徽 省高校 自然科 学研 究重点项 目( K J 2 o 1 2 A2 1 8 ) ; 安徽 省 高校 自然科 学研 究重 点项 目( 2 0 1 3 A2 0 1 ) ; 安徽 省
高校 人 文社 科 重 点 研 究基 地 项 目( S K2 0 1 3 A1 3 5 ) ; 安徽 省 高 校 自然科 学研 究项 目( KJ 2 0 1 3 Z 2 6 4 ) 收 稿 日期 : 2 0 1 2 — 1 2 — 1 4
集 的模 拟 指纹 图像信 号 转换 成 数 字信 号后 , 由
D S P 5 5 0 9 A 的多 通 道缓 冲 串 口 Mc B S P传 送 给 D S P 5 5 0 9 A 进行处理识别 , 最后将匹配识别成功 的指纹图像上传 到 5 5 0 9 A 的集成 开发环境 C C S

基于DSP CCS2.2实现指纹识别预处理系统

基于DSP CCS2.2实现指纹识别预处理系统

基于DSP CCS2.2实现指纹识别预处理系统
赵慧民;朱立
【期刊名称】《电子技术应用》
【年(卷),期】2005(31)7
【摘要】介绍了采用TI公司的高速DSP芯片TMS320VC5402的指纹识别系统的预处理算法和编程实现.算法实现采用的DSP集成开发环境(IDE)为CCS 2.2.通过采用极值滤波、平滑滤波、拉普拉斯锐化、二值化等对指纹图像进行预处理,取得了良好的试验结果.
【总页数】2页(P65-66)
【作者】赵慧民;朱立
【作者单位】佛山科学技术学院,机电学院,广东,佛山,528000;佛山科学技术学院,信息中心,广东,佛山,528000
【正文语种】中文
【中图分类】TP3
【相关文献】
1.基于Cortex+DSP的指纹识别系统设计与实现 [J], 于海涛;王建英
2.基于提升小波算法的指纹识别系统及其DSP实现 [J], 周孝;林其伟
3.基于DSP5402的指纹识别系统实现问题研究 [J], 苑玮琦;张永辉
4.基于DSP与USB的指纹识别系统实现 [J], 谢信琦
5.基于含DSP的ARM嵌入式指纹识别系统的设计与实现 [J], 普措才仁;冯旭
因版权原因,仅展示原文概要,查看原文内容请购买。

基于dsp的指纹识别系统研究

基于dsp的指纹识别系统研究

1 绪论1.1 选题研究背景1.1.1 生物识别生物特征识别技术是指通过计算机利用人体固有的生理特征或行为特征之间的差异来进行个人身份鉴别和认证的一种技术。

生物特征分为身体特征和行为特征两类。

身体特征包括指纹、掌纹、手形、脸型、人体气味、虹膜、视网膜、耳廓、骨骼和DNA等先天特性;行为特征则包括笔迹、声音、步态、击键动作等习惯特性。

生物识别技术最大的特点无非三个方面:高唯一性、高安全性和高便捷性。

而这三个特点其实正是信息安全从业者不懈追求的目标。

围绕这三个特点,生物识别技术出现两大应用前景最为广阔的区域:一是由其高安全性和唯一性,在有高机密防护需求的国家涉密系统等领域的发展;二是凭借其便捷性和唯一性,在大众社会化领域的智能化应用。

随着计算机技术的迅速发展以及不断提升的信息安全保障需求,生物特征识别技术在各类信息系统中得到越来越广泛的应用,并将为保障信息安全发挥越来越重要的作用。

1.1.2生物识别种类生物识别是依靠人体的身体特征来进行身份验证的一种解决方案。

根据生物特征识别技术采用不同的生物特征,广泛应用的生物特征识别技术有:指纹识别、人脸识别、虹膜识别、语音识别、视网膜识别、掌形识别、基因识别和签名识别等。

其各自的特征如下综述:(1)指纹识别[1][2]:指纹在我国古代就被用来代替签字画押,证明身份。

指纹是人与生俱来的身体特征,大约在14岁以后,每个人的指纹就已经定型,指纹具有固定性,不会因人的继续成长而改变。

指纹也具有唯一性,不同的两个人不会具有相同的指纹。

谈及指纹识别,我们接触最多的技术词汇就是拒真率与认假率,所谓拒真就是系统中有该枚指纹数据却被拒绝,所谓认假就是系统中没有该枚指纹数据却被接受。

其实,在实际应用中,我们遇到的问题主要不是拒真率与认假率,而是拒登率(无法使用指纹识别的用户率)。

在所有生物识别技术中,指纹识别是目前最成熟、最方便、可靠、无损伤、价格便宜和应用最广泛的生物识别技术。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

基于DSP指纹识别系统设计
摘要
指纹识别系统是目前性价比最高的生物识别系统之一,将指纹识别技术和嵌入式系统相结合可以使指纹识别技术的应用摆脱空间与环境的限制,更加广泛的适用于各种场合。

随着现代经济和社会的不断发展,越来越多的场合需要身份的确认,我国将成为指纹识别产品的消费大国,因此,开发识别速度快、性价比高的嵌入式指纹自动识别系统具有重要意义。

本文的内容正是关于自动指纹识别系统的研究与设计。

按照设计流程,系统主要包括以下三大部分:指纹图像采集部分、指纹图像处理部分(包括预处理、特征提取及特征匹配)、指纹数据传输部分。

在设计工作中,根据系统的实现要求及目前最新的技术发展情况,并综合考虑成本与性能等因素,确定了以TI公司的数字信号处理器TMS320F2812。

本文首先描述了系统设计的整体思路,然后分章节讲解了各个模块设计中的技术细节,最后列举了一些在系统调试过程中遇到的问题和相应的解决方法,并为系统进一步优化提出了建议。

实验证明本系统设计比较合理、方案可行性高、有较强的实用价值与广阔的前景,并对采用DSP为核心来构建嵌入式处理系统的方案提供了一些有价值的参考。

关键词:指纹识别系统;图像处理;DSP
The Design of Fingerprint Identification system base on DSP
Abstract
Fingerprint identification system is one of the most cost-effective biometric systems in the world, fingerprint identification technology and embedded system can be combined, in this way, the application of fingerprint identification technology can be more widely applicable to various situations without considering space and environmental constraints. As the continuous development of economy and society, identity authentication is needed in more and more occasions,there will be more consumption in fingerprint identification products in our country, therefore, it is significance to develop a cost-effective embedded fingerprint identification system with high identification speed.
This paper is about the study and design of AFIS. According to the process of design the system can be divided into three components:(1)the collection of fingerprint;(2)the processing of fingerprint image including pre-processing, feature extraction and matching of fingerprints;(3)the transmission of data. To meet the needs of modern technique and system realization, the structure of the system is designed properly and the devices in the system are selected carefully. More over, both the cost and the quality are also considered. The main hardware of the system consists of DSP (Data Signal Processor) TMS320F2812.
Integral notion of system design is brought out at the beginning of the paper. Afterwards, detail technical information of module design is narrated in each chapter. At last, some problems encountered in system debugging and method how to solve them are brought out, and some suggestions for system optimization are also provided. The studies prove this embedded system is reasonable, and has the advantages of easy operation, high speed and low cost. This paper provides some valuable references for the design of processing system based on DSP.
Key Words: Fingerprint Identification System ; Image Processing; DSP。

相关文档
最新文档