SlideShare a Scribd company logo
Food Distribution & Management System Using
Biometric Technique (Fdms)
1Gyan Prakash and 2P. T. Sivasankar
1
Project Research Intern
Humanities &Social Science Department
Indian Institute of technology Bombay, Mumbai &
Student, Department of Computer Science & Software Engg.
AarupadaiVeedu Institute of Technology, Vinayaka Missions University
OMRPaiyanoor-603104, KancheepuramDistt.Tamilnadu (India)
2
Associate Professor & Head
1
prakashgyan90@yahoo.com and 2
sivasankar@avit.ac.in
Abstract -
Keywords: Food Distribution & Management System (FDMS) mainly
developed for enabling government for better implementation of Public
Distribution System (PDS) using Biometric Techniques. Corruption has
become an inseparable component of our society. It deeply related in
functioning of governing bodies and system. Illiteracy lack of awarnace, BPL
(below Poverty Line) & APL (Above Poverty Line) has deteriorated the
standard of our society and has occurred whelming contribution in the multi
functioning of the system.This project (the idea) that we were proposing will
not only fight to eliminate the malfunction in current system and monopoly but
also encourage direct communication between governing bodies & public. The
interface is fully transparent & not only eliminate the inter mediators but also
encourage peopleto fully utilize the resources provided by the government. The
project involved interface between government & benefiters using web
technology & cryptography the technology driven method is useful to maintain
transparency & account facility in food grain distribution system.- Database,
Web Technology, Cryptography, Biometric ID card
1 Introduction
Public Distribution System (PDS) was widely criticized for diversion and leakages in
the delivery. It is estimated that 25% diversion takes place before the ration reaches to
the beneficiaries. The main objective of total food grain supply chain computerization
in civil Supplies Corporation to check this diversion. The diversion takes place in
four main areas.
1. Diversion in the procurement itself.
2. Diversion in the movement of commodities between CSC warehouses.
3. Diversion while transporting to FPS from CSC warehouses.
4. Diversion at the FPS level.
1.Timing
Ration shops do not open every day. The objective would appear to be to limit
access to people and divert grain and other produce to the open market.
2. Overcharge and undersupply
This is a common practice adopted by most people that run ration shops. They charge
people more than the mandated rates, and they often under-weigh the commodities.
3. Bribes
People had to pay bribes for small things, such as getting a ration card in the first
place, adding or deleting the name of a family member, or changing the address
mentioned in it.
4. Indifference
The staffs at ration shops don’t know the meaning of the term customer service in
most cases. We were not sure that whether the current scenario will be affected by the
introduction of biometric ID card and transparent interface but what I am sure about
that it will change the current picture of FCI.
2 Objective
1) The politics of support prices
The government allocated funds for the public distribution scheme. The scheme aims
to provide food grains and commodities to poor people at affordable prices .
2) Procurement and pilferage
The government-owned Food Corporation of India procures farm produce.
3) Identification, inclusion and exclusion
Ration cards are supposed to be issued to people living below or on the verge of the
poverty line.
4) Pain at the point of sale
People have difficulty in getting whatever little reaches ration shops. Shop-owners
usually got licenses to run shops on the basis of political patronage or outright bribes.
Thus, three step strategies had been adapted in using ICT to check diversion and
leakage in the delivery mechanism of PDS. As described below.
Step 1 Create transparency in operations so that every citizen can very easily know
what is happening and what is supposed to happen.Transparency had been created by
computerizing all operations involved in PDS and providing all information on web
and some vital information through SMS.
Step 2 Provide most convenient way to give feedback or lodge complaint for a
citizen so that one can lodge a complaint whenever some discrepancy is found.
Step 3 Build confidence in public that complaints lodged through the system will
be attended to.
3 Methodology
The entire system is so designed to provide easy access to data, records and
information paralleling maintaining data integrity and security in all and every
aspects.All the information is stored in encrypted format and access is provided to the
only authorized person. The entire system is divided into two core process, namely a)
Enrolment and Authentication b) authorized access to data.
3.1 Verification and Authentication process
Looking at biometric systems in a more general way will reveal certain things all
biometric-based authentication systems have in common. In general such systems
work in two modes:
a. Enrolment mode: In this mode biometric user data is acquired. This is mostly
done with some type of biometric reader.
b. Authentication mode: Again biometric user data is acquired first and used by the
systemto either verify the users claimed identity or to identify who the user is.
Work plan Process Execution Flow
Data Acquisition
Fingerprint data is acquired when subjects firmly press their fingers against a glass or
polycarbonate plate.
Enrolment Procedure and Time
As instructed, subject enters a 1- to 9-digit PIN on the keypad. As cued, the finger is
placed on the reader plate and then removed.
Template or File Size:
Fingerprint user files are generally between 500 and 1,500 bytes.
Accuracy
Some fingerprint systems can be adjusted to achieve a false accept rate of 0.0%.
Sandia National Laboratories tests of a top-rated fingerprint system in 1991 and 1993
produced a three-try false reject rate of 9.4% and a crossover error rate of 5%.
3.2 Authorized access to data.
This part deals with manipulation of information and data. It basically consist a list
a) Personal details
b) History
c) Deposited
d) Withdrawal
e) Transaction detail:
f) Next lot Information
g) Help and guidance
h) Right to information
i) Contact Information
Sample Screen snort for Biometric ID Card
4 Work Plan
The first time an individual used a biometric system is called an enrolment. During
the enrolment, biometric information from an individual is stored. The first block
(sensor) is the interface between the real world and the system. The second block
performs all the necessary pre-processing. In the third block necessary features are
extracted. This step is an important step as the correct features need to be extracted in
the optimal way. A template is a synthesis of the relevant characteristics extracted
from the source
Simple biometric systems usually consist of the following four components:-
1. Sensor modules: This module acquires biometric user data.2) Feature extraction
modules: This module is responsible for extracting feature values of a biometric
trait.3) Matching modules: The matching module compares the acquired biometric
features against those stored in a database.4) Decision-making modules: The users’
identity is either established or a claimed identity is accepted or rejected. In general
one can consider the verification of the identity of a person a two-class problem:
Either the person is who he/she claims to be (client). Or the person fails to be the one
he/she claims to be (impostor).
In binary decision scheme it obvious decision-making can make two kinds of errors.
False Rejection (FR): when an actual client gets identified as an impostor.
False Acceptance (FA): when an actual impostor gets identified as a client.
5 Conclusion
Food distribution and management system tested in Civil Supplies
Corporation”(CSC) .Distribute & manage the food in public Distribution System and
information” as described where it used for both procurement and tracking. This
shows that Food distribution and management system is ready for real world use in
biometric techniques and is to be preferred in communication between government &
public &security purpose. Food distribution and management system that can be
attacked and factors that you need to be careful of in implementation. Although there
is no any complexity that FDMS is more useful. It is also provides food grain,
tracking & account transparency.In future this technology can be used in government
sectors.
References
1. BiometricHistoryfrom National Science & Technology Council (NSTC), Committee handed on
National Security, Subcommittee on Biometrics
2. www.ti.com/biometrics.
3. Biometric Recognition: A New Paradigm for Security by Anil K Jain Dept of Computer Science
&Engineering, Michigan state university, www.bimetric.cse.msu.edu
4. www.smartcardalliance.org.
5. U.S.Government,.BiometricU.S.Visas.,http://usembassy.state.gov/posts/ar1/wwwhbiometricinfo.html
May 2004.
6. Biometrics for Secure IdentityVerification: Trends and Developments by JosephW. Lewis Universityof
Maryland Bowie State University.

More Related Content

PDF
06 20273 37746-1-ed
PDF
Låne guide
PDF
Carla Pivonski | Institute Magazine - Editorial Pics
PPTX
Winning winnipeg women 11
PPTX
Epc p2-slides (1)
PPT
Pp sobre foro exponegocios de motivación.1
PDF
52 ways to steer your career slideshare
06 20273 37746-1-ed
Låne guide
Carla Pivonski | Institute Magazine - Editorial Pics
Winning winnipeg women 11
Epc p2-slides (1)
Pp sobre foro exponegocios de motivación.1
52 ways to steer your career slideshare

Viewers also liked (13)

PPTX
Global e journal libraryご紹介!20141120
PDF
Inertia dynamics sheave_clutches_specsheet
PPTX
Reefer Tracking - Knowledge is Power: The Analytical Advantage
PPTX
Kuba prezentace
PPTX
Distribution of food in the world
PPTX
1º Int 1 teatro europeo ss.xvi y xvii
PPT
Presentation sainsbury's
PPT
Sainsburys Brand Presentation
PDF
Carlos Alvarez. Taller de Emociones, Coaching y PNL
PDF
Sainsbury's case study
PPT
Sainsburys presentation
PPTX
Food logistic
PPT
Módulo5 pg150
Global e journal libraryご紹介!20141120
Inertia dynamics sheave_clutches_specsheet
Reefer Tracking - Knowledge is Power: The Analytical Advantage
Kuba prezentace
Distribution of food in the world
1º Int 1 teatro europeo ss.xvi y xvii
Presentation sainsbury's
Sainsburys Brand Presentation
Carlos Alvarez. Taller de Emociones, Coaching y PNL
Sainsbury's case study
Sainsburys presentation
Food logistic
Módulo5 pg150
Ad

Similar to Food Distribution & Management System Using Biometric Technique (Fdms) (20)

PPTX
Biometric authentication system for equitable distribution.
PDF
IRJET - Smart Public Distribution System
PDF
IRJET-Design and Implementation of Ration Distribution System to Stop the Cor...
PDF
IRJET- Integration of Physical System Monitoring, Crime Posting Alerting ...
PDF
A_Technology_Based_solution_for_Public_Distribution_System
PDF
Paper id 71201959
PDF
rowland proj
PDF
Fingerprint Alert System A Solution for Effective Management System
Biometric authentication system for equitable distribution.
IRJET - Smart Public Distribution System
IRJET-Design and Implementation of Ration Distribution System to Stop the Cor...
IRJET- Integration of Physical System Monitoring, Crime Posting Alerting ...
A_Technology_Based_solution_for_Public_Distribution_System
Paper id 71201959
rowland proj
Fingerprint Alert System A Solution for Effective Management System
Ad

More from Gyan Prakash (7)

PDF
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
PDF
INVESTIGATE THE ROLE OF IMPULSIVITY IN DECISIONS MAKING DURING GAMBLING TASK:...
PDF
Network Traffic Anomaly Detection Through Bayes Net
PDF
To Investigate Role of Impulsivity, Reward and Loss of Sensitivity in Decisio...
DOCX
Wireless Health Monitoring Systems
PDF
Internet ttraffic monitering anomalous behiviour detection
PDF
Avanced process control enteprise management system
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
INVESTIGATE THE ROLE OF IMPULSIVITY IN DECISIONS MAKING DURING GAMBLING TASK:...
Network Traffic Anomaly Detection Through Bayes Net
To Investigate Role of Impulsivity, Reward and Loss of Sensitivity in Decisio...
Wireless Health Monitoring Systems
Internet ttraffic monitering anomalous behiviour detection
Avanced process control enteprise management system

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
A Presentation on Artificial Intelligence
PPTX
Big Data Technologies - Introduction.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Electronic commerce courselecture one. Pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
1. Introduction to Computer Programming.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation_ Review paper, used for researhc scholars
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
A Presentation on Artificial Intelligence
Big Data Technologies - Introduction.pptx
MYSQL Presentation for SQL database connectivity
Programs and apps: productivity, graphics, security and other tools
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Electronic commerce courselecture one. Pdf
Unlocking AI with Model Context Protocol (MCP)
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
The Rise and Fall of 3GPP – Time for a Sabbatical?
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Diabetes mellitus diagnosis method based random forest with bat algorithm
1. Introduction to Computer Programming.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing

Food Distribution & Management System Using Biometric Technique (Fdms)

  • 1. Food Distribution & Management System Using Biometric Technique (Fdms) 1Gyan Prakash and 2P. T. Sivasankar 1 Project Research Intern Humanities &Social Science Department Indian Institute of technology Bombay, Mumbai & Student, Department of Computer Science & Software Engg. AarupadaiVeedu Institute of Technology, Vinayaka Missions University OMRPaiyanoor-603104, KancheepuramDistt.Tamilnadu (India) 2 Associate Professor & Head 1 prakashgyan90@yahoo.com and 2 sivasankar@avit.ac.in Abstract - Keywords: Food Distribution & Management System (FDMS) mainly developed for enabling government for better implementation of Public Distribution System (PDS) using Biometric Techniques. Corruption has become an inseparable component of our society. It deeply related in functioning of governing bodies and system. Illiteracy lack of awarnace, BPL (below Poverty Line) & APL (Above Poverty Line) has deteriorated the standard of our society and has occurred whelming contribution in the multi functioning of the system.This project (the idea) that we were proposing will not only fight to eliminate the malfunction in current system and monopoly but also encourage direct communication between governing bodies & public. The interface is fully transparent & not only eliminate the inter mediators but also encourage peopleto fully utilize the resources provided by the government. The project involved interface between government & benefiters using web technology & cryptography the technology driven method is useful to maintain transparency & account facility in food grain distribution system.- Database, Web Technology, Cryptography, Biometric ID card 1 Introduction Public Distribution System (PDS) was widely criticized for diversion and leakages in the delivery. It is estimated that 25% diversion takes place before the ration reaches to the beneficiaries. The main objective of total food grain supply chain computerization in civil Supplies Corporation to check this diversion. The diversion takes place in four main areas. 1. Diversion in the procurement itself. 2. Diversion in the movement of commodities between CSC warehouses. 3. Diversion while transporting to FPS from CSC warehouses. 4. Diversion at the FPS level.
  • 2. 1.Timing Ration shops do not open every day. The objective would appear to be to limit access to people and divert grain and other produce to the open market. 2. Overcharge and undersupply This is a common practice adopted by most people that run ration shops. They charge people more than the mandated rates, and they often under-weigh the commodities. 3. Bribes People had to pay bribes for small things, such as getting a ration card in the first place, adding or deleting the name of a family member, or changing the address mentioned in it. 4. Indifference The staffs at ration shops don’t know the meaning of the term customer service in most cases. We were not sure that whether the current scenario will be affected by the introduction of biometric ID card and transparent interface but what I am sure about that it will change the current picture of FCI. 2 Objective 1) The politics of support prices The government allocated funds for the public distribution scheme. The scheme aims to provide food grains and commodities to poor people at affordable prices . 2) Procurement and pilferage The government-owned Food Corporation of India procures farm produce. 3) Identification, inclusion and exclusion
  • 3. Ration cards are supposed to be issued to people living below or on the verge of the poverty line. 4) Pain at the point of sale People have difficulty in getting whatever little reaches ration shops. Shop-owners usually got licenses to run shops on the basis of political patronage or outright bribes. Thus, three step strategies had been adapted in using ICT to check diversion and leakage in the delivery mechanism of PDS. As described below. Step 1 Create transparency in operations so that every citizen can very easily know what is happening and what is supposed to happen.Transparency had been created by computerizing all operations involved in PDS and providing all information on web and some vital information through SMS. Step 2 Provide most convenient way to give feedback or lodge complaint for a citizen so that one can lodge a complaint whenever some discrepancy is found. Step 3 Build confidence in public that complaints lodged through the system will be attended to. 3 Methodology The entire system is so designed to provide easy access to data, records and information paralleling maintaining data integrity and security in all and every aspects.All the information is stored in encrypted format and access is provided to the only authorized person. The entire system is divided into two core process, namely a) Enrolment and Authentication b) authorized access to data. 3.1 Verification and Authentication process Looking at biometric systems in a more general way will reveal certain things all biometric-based authentication systems have in common. In general such systems work in two modes: a. Enrolment mode: In this mode biometric user data is acquired. This is mostly done with some type of biometric reader. b. Authentication mode: Again biometric user data is acquired first and used by the systemto either verify the users claimed identity or to identify who the user is.
  • 4. Work plan Process Execution Flow Data Acquisition Fingerprint data is acquired when subjects firmly press their fingers against a glass or polycarbonate plate. Enrolment Procedure and Time As instructed, subject enters a 1- to 9-digit PIN on the keypad. As cued, the finger is placed on the reader plate and then removed. Template or File Size: Fingerprint user files are generally between 500 and 1,500 bytes. Accuracy Some fingerprint systems can be adjusted to achieve a false accept rate of 0.0%. Sandia National Laboratories tests of a top-rated fingerprint system in 1991 and 1993 produced a three-try false reject rate of 9.4% and a crossover error rate of 5%. 3.2 Authorized access to data. This part deals with manipulation of information and data. It basically consist a list a) Personal details b) History c) Deposited d) Withdrawal e) Transaction detail: f) Next lot Information g) Help and guidance h) Right to information i) Contact Information Sample Screen snort for Biometric ID Card 4 Work Plan The first time an individual used a biometric system is called an enrolment. During the enrolment, biometric information from an individual is stored. The first block (sensor) is the interface between the real world and the system. The second block performs all the necessary pre-processing. In the third block necessary features are extracted. This step is an important step as the correct features need to be extracted in the optimal way. A template is a synthesis of the relevant characteristics extracted from the source
  • 5. Simple biometric systems usually consist of the following four components:- 1. Sensor modules: This module acquires biometric user data.2) Feature extraction modules: This module is responsible for extracting feature values of a biometric trait.3) Matching modules: The matching module compares the acquired biometric features against those stored in a database.4) Decision-making modules: The users’ identity is either established or a claimed identity is accepted or rejected. In general one can consider the verification of the identity of a person a two-class problem: Either the person is who he/she claims to be (client). Or the person fails to be the one he/she claims to be (impostor). In binary decision scheme it obvious decision-making can make two kinds of errors. False Rejection (FR): when an actual client gets identified as an impostor. False Acceptance (FA): when an actual impostor gets identified as a client. 5 Conclusion Food distribution and management system tested in Civil Supplies Corporation”(CSC) .Distribute & manage the food in public Distribution System and information” as described where it used for both procurement and tracking. This shows that Food distribution and management system is ready for real world use in biometric techniques and is to be preferred in communication between government & public &security purpose. Food distribution and management system that can be attacked and factors that you need to be careful of in implementation. Although there is no any complexity that FDMS is more useful. It is also provides food grain, tracking & account transparency.In future this technology can be used in government sectors. References 1. BiometricHistoryfrom National Science & Technology Council (NSTC), Committee handed on National Security, Subcommittee on Biometrics 2. www.ti.com/biometrics. 3. Biometric Recognition: A New Paradigm for Security by Anil K Jain Dept of Computer Science &Engineering, Michigan state university, www.bimetric.cse.msu.edu 4. www.smartcardalliance.org.
  • 6. 5. U.S.Government,.BiometricU.S.Visas.,http://usembassy.state.gov/posts/ar1/wwwhbiometricinfo.html May 2004. 6. Biometrics for Secure IdentityVerification: Trends and Developments by JosephW. Lewis Universityof Maryland Bowie State University.