Biometrics Attendance: A Seminar Report
Biometrics Attendance: A Seminar Report
Biometrics Attendance: A Seminar Report
A SEMINAR REPORT
Submitted By-
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING
AT
SUBMITTED TO:
1. ACKNOWLEDGMENT
2. INTRODUCTION
3. EXISTING SYSTEM
4. TYPOLOGY OF IDENTIFICATION METHODS
5. SECURITY
6. Authentication Using Fingerprints
7. Matching Result
8. HARDWARE AND SOFTWARE
9. RULES FOR MARKING ATTENDANCE
10. SENSOR AND LCD
11. CONCLUSION
12. REFERENCES
ACKNOWLEDGEMENT
Last but clearly not the least, I would thank The Almighty for giving
me strength to complete my report on time.
SANDEEP CHAUDHARY
Roll No. :- 1642210084
INTRODUCTION
While the move towards the digital era is being accelerated every hour,
biometrics technologies have begun to affect people’s daily life more and
more. Biometrics technologies verify identity through characteristics such
as fingerprints, faces, irises, retinal patterns, palm prints, voice, hand-
written signatures, and so on. These techniques, which use physical data,
are receiving attention as a personal authentication method that is more
convenient than conventional methods such as a password or ID cards.
Biometric personal authentication uses data taken from measurements.
Such data is unique to the individual and remains so throughout one’s life.
This technology has been applied for controlling access to high-security
facilities, but it is now being widespread developed in information systems
such as network, e-commerce, and retail applications. In these
technologies, fingerprint becomes the most mature and popular biometrics
technology used in automatic personal identification. In the beginning,
fingerprint verifying used in the military affairs and in the criminal
identification. But now, this technology is also being used in several other
applications such as access control for high security installations, credit
card.
EXISTING SYSTEM
Most of the attendance systems use paper based methods for taking and
calculating attendance and this manual method requires paper sheets and
a lot of stationery material. Previously a very few work has been done
relating to the academic attendance monitoring problem. Some software’s
have been designed previously to keep track of attendance. But they
require manual entry of data by the staff workers. So the problem remains
unsolved. Furthermore idea of attendance tracking systems using facial
recognition.
TYPOLOGY OF IDENTIFICATION METHODS
Characteristics
Automated biometrics
Physiological Behavioral
System Description
There are two reasons for error Failure to enroll rate (FTE) and Failure to
capture (FTC) rate of biometric device FTC rate depends on functionality
of the system and FTE occur due to poor quality inputs.
Implementation:-
It can be concluded from the above discussion that a reliable, secure, fast
and an efficient system has been developed replacing a manual and
unreliable system. This system can be implemented in academic institutes
for better results regarding the management of attendance. This system
will save time, reduce the amount of work the administration has to do and
will replace the stationery material with electronic apparatus. Hence a
system with expected results has been developed .
References