Biometrics Attendance: A Seminar Report

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 14

BIOMETRICS ATTENDANCE

A SEMINAR REPORT

Submitted By-

Name:- SANDEEP CHAUDHARY


University Roll No.-1642210084
(2016-2020)
Submitted in partial
fulfillment for the award of
the degree of

BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING
AT

SUBMITTED TO:

Department of Computer Science


BANSAL INSTITUTE OF ENGINEERING
&TECHNOLOGY
,LUCKNOW
ABSTRACT

Fingerprint verification is one of the most reliable personal identification


methods in biometrics .With the rapid development of fingerprint
verification, a number of its applications have been proposed until now
including time attendance system etc. In this paper, a fingerprint
attendance management system is designed and implemented .This
system based biometrics and serial port communication technique solves
the problem of spurious attendance and trouble of maintaining the register.
It can make the users’ attendances more easily and effectively.
Key-Words: -fingerprint verification; biometrics attendance management
TABLE OF CONTENTS

1. ACKNOWLEDGMENT
2. INTRODUCTION
3. EXISTING SYSTEM
4. TYPOLOGY OF IDENTIFICATION METHODS
5. SECURITY
6. Authentication Using Fingerprints
7. Matching Result
8. HARDWARE AND SOFTWARE
9. RULES FOR MARKING ATTENDANCE
10. SENSOR AND LCD
11. CONCLUSION
12. REFERENCES
ACKNOWLEDGEMENT

I would like to thank respected Mr. Madan Kushwaha (HOD


CS/IT)and ALL FACILITY for giving me such a wonderful opportunity
to expand my knowledge for my own branch and giving me guidelines
to build a project report. It helped me a lot to realize of what we study
for.
Secondly, I would like to thank my parents who patiently helped me
as I went through my work and helped to modify and eliminate some
of the irrelevant or un-necessary stuffs. Thirdly, I would like to thank
my friends who helped me to make my work more organized and
well-stacked till theend.

Next, I would thank Microsoft for developing such a wonderful tool


like MS Word. It helped my work a lot to remain error-free.

Last but clearly not the least, I would thank The Almighty for giving
me strength to complete my report on time.

SANDEEP CHAUDHARY
Roll No. :- 1642210084
INTRODUCTION

While the move towards the digital era is being accelerated every hour,
biometrics technologies have begun to affect people’s daily life more and
more. Biometrics technologies verify identity through characteristics such
as fingerprints, faces, irises, retinal patterns, palm prints, voice, hand-
written signatures, and so on. These techniques, which use physical data,
are receiving attention as a personal authentication method that is more
convenient than conventional methods such as a password or ID cards.
Biometric personal authentication uses data taken from measurements.
Such data is unique to the individual and remains so throughout one’s life.
This technology has been applied for controlling access to high-security
facilities, but it is now being widespread developed in information systems
such as network, e-commerce, and retail applications. In these
technologies, fingerprint becomes the most mature and popular biometrics
technology used in automatic personal identification. In the beginning,
fingerprint verifying used in the military affairs and in the criminal
identification. But now, this technology is also being used in several other
applications such as access control for high security installations, credit
card.

The reason for the popularity of fingerprint verifying is that fingerprints


satisfy uniqueness, stability, permanency and easily taking. Just for this, a
number of fingerprint verification approaches have been proposed until
now
This system is an application of the fingerprint verifying and serial port
communication techniques and it is mainly used for employee
identification. Through practices, this system is proved to be easy-to-use
and effectively. And this paper is organized as follows. Section 2 describes
the technological requirements for this system design. Section 3 outlines
the functions of this system briefly and describes the hardware and
software design of this system. Section 4 introduces some key problems in
the implement of this system and finally Section 5 contains conclusions .
A biometric system is essentially a pattern recognition system, which
makes a personal identification by determining the authenticity of a
specific physiological or behavioral characteristics possessed by the user.
An important issue in designing a practical system is to determine how
an individual is identified. Depending on the context, a biometric system
can be either a verification (authentication) system or an identification
system. There are two different ways to resolve a person’s identity:

The fingerprint’s stability and uniqueness is well established. Based


upon a century of examination, it is estimated that the change of
two people, including twins, having the same print is less than
one a billion.

In verifying a print, many devices on the market analyze the position


of details called minutiae such as the endpoints and junctions of
print ridges. These devices assign locations to the minutiae using x,
y, and directional variables. Some devices also count the
number of ridges between minutiae to form the reference
template. Several companies claim to be developing templates of
under 100 bytes. Other machine approach the finger as an image
processing problem and applying custom very large scale integrated
chips,neural networks, fuzzy logic and other technologies to the
matching problem.
The fingerprint recognition technology was developed for some 12
years before Being matched in 1983 by Identix Inc.

EXISTING SYSTEM
Most of the attendance systems use paper based methods for taking and
calculating attendance and this manual method requires paper sheets and
a lot of stationery material. Previously a very few work has been done
relating to the academic attendance monitoring problem. Some software’s
have been designed previously to keep track of attendance. But they
require manual entry of data by the staff workers. So the problem remains
unsolved. Furthermore idea of attendance tracking systems using facial
recognition.
TYPOLOGY OF IDENTIFICATION METHODS

Characteristics

Manual and semi- Biographics


automated biometrics

Automated biometrics

Physiological Behavioral

Face Finger Hand Eye


print

Signature Voice Keystroke


A Multimodal Biometric System Using Fingerprint, Face
Authentication Using Fingerprints

A attendance management is an important part of companies management


system. It can be in contact with salary of employee, work efficiency of company
and even affects business image of company and staff morale. So the problem of
reasonably, effectively and scientifically managing of staff attendances has
become all companies facing issue. Traditional styles of attendance
management include hand-written signatures, card bell, magnetic card, IC card
and RF card attendance machines. These styles cannot avoid replacer checking
out just because that people can be separated from cards.

The great advantage of the authentication using fingerprints is the irreplaceable


nature. Through the analysis of the overall and local characteristics of fingerprint
such as ridges, valleys, ending, bifurcation points and ridge divergence points,
we can extract enough detail data. Such data is unique to the individual and
remains so throughout one’s life.
We can use these data to identify or verify a person operating as follows:
 
(1) a digital image of one person’s fingerprint to be verified is captured; a
feature extracting algorithm is carried out; minutiae are extracted and
stored as a template for verifying later; people to be verified place his
finger on the fingerprint sensor so as to extracting the minutiae from the
captured image; a matching algorithm is applied to matches the minutiae
with the stored template previously.
Matching Result

Transmission Using Off-Line Technique:-

There are mainly two kinds of fingerprint attendance management system


on the market. One is on-line fingerprint attendance management system
and the other is off-line fingerprint attendance management system. On-
line system always needs to connect with a PC or workstation and all the
fingerprints’ templates of people to be verified must stored in the database
in the PC or workstation. Thereby, matching fingerprints needs the support
of the background PC. This kind of attendance management system is
easy to paralysis in case of malfunctions of fingerprint attendance
machines, transmission line or PC. Once several systems connect to form
a network, burden of PC and the response time of the system will be
added.
And one off-line fingerprint attendance management system can finish all
the process including capturing the image of fingerprint, extracting
minutiae, storing and matching. All the operating of matching fingerprint
needn’t support of PC and the burden of PC is lightened. The same
systems can connect to form a 485 network and finally connect to the
center PC of management system. So off-line systems are widely used in
many occasions. And the shortcomings of this system are that there must
be a managing PC nearly and it is difficult to lay the transmission lines
where topography is bad.

System Description

Hardware:A fingerprint sensor device along with an LCD screen is


placed at the entrance of Office room or staff room. The fingerprint sensor
is used to capture the fingerprints of staff members or employees while
LCD screen notifies the members that his/her attendance has been
marked.
Software Tools:
1. For the development of the system, the following software tools
were used
2. Java Software Development Kit
3. Java IDE (Net Beans 6.5)
4. MySql Database

Rules for marking attendance: -

Employees or staff members should scan his/her finger correctly on the


fingerprint sensor as shown in Figure 2. If fingerprint is not enrolled
correctly on reader as shown in Figure 3, it could lead to biometric error i.e.
biometric device does not make perfect match decision.

There are two reasons for error Failure to enroll rate (FTE) and Failure to
capture (FTC) rate of biometric device FTC rate depends on functionality
of the system and FTE occur due to poor quality inputs.

Scenario of automatic attendance system

The scenario of automatic attendance system attached to a main office or


staff room. Database storage contains the fingerprint templates of
employees or staff members along with their information (names,
registration numbers and in-time, out-time). When employees of staff
members enrolls his/her finger on the scanner his/her fingerprint is
matched with database to mark the attendance.

SENSOR AND LCD

Attendance Scanning Update Database Storage Employees/Staff


Members

Implementation:-

Hardware equipment is placed at the door of Office room. Before entering


the room employees or members are identified through fingerprint scanner.
On identification of a employee his/her attendance is marked.
 
Following sequence of steps summarize the process of marking the
attendance.
Step 1: Capture the student’s fingerprint sample and create a feature set.
A set of unique features created to match fingerprint is called feature set.
Step 2: Retrieve the stored templates from the repository (database).
Step 3: Perform a one-to-n comparison between the fingerprint feature set
and the fingerprint templates stored in database, make a decision of match
or non-match.
Conclusion

It can be concluded from the above discussion that a reliable, secure, fast
and an efficient system has been developed replacing a manual and
unreliable system. This system can be implemented in academic institutes
for better results regarding the management of attendance. This system
will save time, reduce the amount of work the administration has to do and
will replace the stationery material with electronic apparatus. Hence a
system with expected results has been developed .

References

[1] D. Maltoni, D. Maio, A. K. Jain, S. Prabhaker, “Handbook of Fingerprint


Recognition”, Springer, New York, 2003.
[2] A.C. Weaver, “Biometric authentication”, Computer, 39(2), pp 96-97 (
[3] J. Ortega-Garcia, J. Bigun, D. Reynolds and J.Gonzalez-Rodriguez,
“Authentication gets personal with biometrics”, Signal Processing Magazine,
IEEE, 21(2), pp 50-62
[4] Anil K. Jain, Arun Ross and Salil Prabhakar,” An introduction to biometric
recognition”, Circuits and Systems for Video Technology, IEEE Transactions on
Volume 14, Issue 1, Jan. 2004 Page(s):4 – 20.
[5] Fakhreddine Karray, Jamil Abou Saleh, Mo Nours Arab and Milad
Alemzadeh,, “Multi Modal Biometric Systems: A State of the Art Survey” , Pattern
Analysis and Machine Intelligence Laboratory, University of Waterloo, Waterloo,
Canada.
[6] Abdulmotaleb El Saddik, Mauricio Orozco, Yednek Asfaw, Shervin
Shirmohammadi and Andy Adler “A Novel Biometric System for Identification and
Verification of Haptic Users”, Multimedia Communications Research Laboratory
(MCRLab) School of Information Technology and Engineering University .

[7] H. C. Lee and R. E. Gaensslen, “Advances in Fingerprint Technology”,


Elsevier, New York.
[8] Sharath Pankanti, Salil Prabhakar, Anil K. Jain, “On the Individuality of
Fingerprints”, IEEE transaction on pattern analysis and machine intelligence,

[9] Federal Bureau of Investigation, “The Science of Fingerprints: Classification


and Uses”, U. S. Government Printing Office, Washington, D. C.,
[10] H. C. Lee and R. E. Gaensslen (eds.), “Advances in Fingerprint Technology”,
Second Edition, CRC Press, New York,
[11] K.G.M.S.K. Jayawardana, T.N. Kadurugamuwa, R.G. Rage and S.
Radhakrishnan”, Timesheet: An Attendance Tracking System”, Proceedings of
the Peradeniya University Research Sessions, Sri Lanka, Vol.13, Part II, 18th
December
[12] Yohei KAWAGUCHI, Tetsuo SHOJI , Weijane LIN ,Koh KAKUSHO ,
Michihiko MINOH ,“Face Recognition-based Lecture Attendance System”,
Department of Intelligence Science and Technology, Graduate School of
Informatics, Kyoto University. Academic Center for Computing and Media Studies,
Kyoto

You might also like