19
PREPARED BY ADITYA VYAS PREPARED BY ADITYA VYAS FOR POSITRON FOR POSITRON TECHNOLOGIES TECHNOLOGIES VISIT VISIT WWW.POSITRONINDIA.COM FOR ANY HELP ON THIS FOR ANY HELP ON THIS PROJEC PROJEC

Biometric Fingerprint Attendance

  • Upload
    vyastth

  • View
    1.471

  • Download
    3

Embed Size (px)

Citation preview

Page 1: Biometric Fingerprint Attendance

PREPARED BY ADITYA VYASPREPARED BY ADITYA VYASFOR POSITRON FOR POSITRON TECHNOLOGIESTECHNOLOGIES

VISIT VISIT WWW.POSITRONINDIA.COM

FOR ANY HELP ON THIS FOR ANY HELP ON THIS PROJECPROJEC

Page 2: Biometric Fingerprint Attendance

Biometric Fingerprint Attendance Management Biometric Fingerprint Attendance Management SystemSystem

Page 3: Biometric Fingerprint Attendance

A PROJECT REPORT ONA PROJECT REPORT ON

BIOMETRIC FINGERPRINT ATTENDANCE MANAGEMENT BIOMETRIC FINGERPRINT ATTENDANCE MANAGEMENT SYSTEMSYSTEM

For For

SUBMITTED TOSUBMITTED TO

SUBMITTED IN PARTIAL FULFILLMENT OF THE SUBMITTED IN PARTIAL FULFILLMENT OF THE

MASTER OF COMPUTER ADMINISTRATIONMASTER OF COMPUTER ADMINISTRATION

BYBY

POSITRON TECHNOLOGIESPOSITRON TECHNOLOGIES

www.positronindia.comwww.positronindia.com

Page 4: Biometric Fingerprint Attendance

ABSTRACTABSTRACT

Fingerprint verification is one of the most reliable personal Fingerprint verification is one of the most reliable personal identification methods in biometrics .With the rapid development identification methods in biometrics .With the rapid development of fingerprint verification, a number of its applications have been of fingerprint verification, a number of its applications have been proposed until now including time attendance system etc. In this proposed until now including time attendance system etc. In this paper, a fingerprint attendance management system is paper, a fingerprint attendance management system is designed and implemented .This system based biometrics and designed and implemented .This system based biometrics and serial port communication technique solves the problem of serial port communication technique solves the problem of spurious attendance and trouble of maintaining the register. It spurious attendance and trouble of maintaining the register. It can make the users’ attendances more easily and effectively.can make the users’ attendances more easily and effectively.Key-Words: - fingerprint verification; biometrics attendance Key-Words: - fingerprint verification; biometrics attendance managementmanagement

Page 5: Biometric Fingerprint Attendance

1 INTRODUCTION1 INTRODUCTION

While the move towards the digital era is being accelerated While the move towards the digital era is being accelerated every hour, biometrics technologies have begun to affect every hour, biometrics technologies have begun to affect people’s daily life more and more. Biometrics technologies people’s daily life more and more. Biometrics technologies verify identity through characteristics such as fingerprints, verify identity through characteristics such as fingerprints, faces, irises, retinal patterns, palm prints, voice, hand-written faces, irises, retinal patterns, palm prints, voice, hand-written signatures, and so on. These techniques, which use physical signatures, and so on. These techniques, which use physical data, are receiving attention as a personal authentication data, are receiving attention as a personal authentication method that is more convenient than conventional methods method that is more convenient than conventional methods such as a password or ID cards. Biometric personal such as a password or ID cards. Biometric personal authentication uses data taken from measurements. Such data authentication uses data taken from measurements. Such data is unique to the individual and remains so throughout one’s is unique to the individual and remains so throughout one’s life.life.This technology has been applied for controlling access to high-This technology has been applied for controlling access to high-security facilities, but it is now being widespread developed in security facilities, but it is now being widespread developed in information systems such as network, e-commerce, and retail information systems such as network, e-commerce, and retail applications. In these technologies, fingerprint becomes the applications. In these technologies, fingerprint becomes the most mature and popular biometrics technology used in most mature and popular biometrics technology used in automatic personal identification. In the beginning, fingerprint automatic personal identification. In the beginning, fingerprint verifying used in the military affairs and in the criminal verifying used in the military affairs and in the criminal identification. But now, this technology is also being used in identification. But now, this technology is also being used in several other applications such as access control for high several other applications such as access control for high security installations, credit card usage verification, and security installations, credit card usage verification, and employee identification. employee identification.

Page 6: Biometric Fingerprint Attendance

The reason for the popularity of fingerprint verifying is that The reason for the popularity of fingerprint verifying is that fingerprints satisfy uniqueness, stability, permanency and fingerprints satisfy uniqueness, stability, permanency and easily taking. Just for this, a number of fingerprint verification easily taking. Just for this, a number of fingerprint verification approaches have been proposed until nowapproaches have been proposed until now

This system is an application of the fingerprint verifying and This system is an application of the fingerprint verifying and serial port communication techniques and it is mainly used for serial port communication techniques and it is mainly used for employee identification. Through practices, this system is employee identification. Through practices, this system is proved to be easy-to-use and effectively. And this paper is proved to be easy-to-use and effectively. And this paper is organized as follows. Section 2 describes the technological organized as follows. Section 2 describes the technological requirements for this system design. Section 3 outlines the requirements for this system design. Section 3 outlines the functions of this system briefly and describes the hardware and functions of this system briefly and describes the hardware and software design of this system. Section 4 introduces some key software design of this system. Section 4 introduces some key problems in the implement of this system and finally Section 5 problems in the implement of this system and finally Section 5 contains conclusions and future research plan.contains conclusions and future research plan.

Page 7: Biometric Fingerprint Attendance

EXISTING SYSTEMEXISTING SYSTEM

Most of the attendance systems use paper based methods Most of the attendance systems use paper based methods

for taking and calculating attendance and this manual for taking and calculating attendance and this manual

method requires paper sheets and a lot of stationery method requires paper sheets and a lot of stationery

material. Previously a very few work has been done relating material. Previously a very few work has been done relating

to the academic attendance monitoring problem. Some to the academic attendance monitoring problem. Some

software’s have been designed previously to keep track of software’s have been designed previously to keep track of

attendance. But they require manual entry of data by the attendance. But they require manual entry of data by the

staff workers. So the problem remains unsolved. Furthermore staff workers. So the problem remains unsolved. Furthermore

idea of attendance tracking systems using facial recognition idea of attendance tracking systems using facial recognition

techniques have also been proposed but it requires techniques have also been proposed but it requires

expensive apparatus still not getting the required accuracy. expensive apparatus still not getting the required accuracy.

Page 8: Biometric Fingerprint Attendance

2 Requirements for System Design2 Requirements for System Design

2.1 Authentication Using Fingerprints:-2.1 Authentication Using Fingerprints:-

A attendance management is an important part of companies A attendance management is an important part of companies management system. It can be in contact with salary of employee, management system. It can be in contact with salary of employee, work efficiency of company and even affects business image of work efficiency of company and even affects business image of company and staff morale. So the problem of reasonably, company and staff morale. So the problem of reasonably, effectively and scientifically managing of staff attendances has effectively and scientifically managing of staff attendances has become all companies facing issue. Traditional styles of attendance become all companies facing issue. Traditional styles of attendance management include hand-written signatures, card bell, magnetic management include hand-written signatures, card bell, magnetic card, IC card and RF card attendance machines. These styles card, IC card and RF card attendance machines. These styles cannot avoid replacer checking out just because that people can be cannot avoid replacer checking out just because that people can be separated from cards.separated from cards.

  

The great advantage of the authentication using fingerprints is the The great advantage of the authentication using fingerprints is the irreplaceable nature. Through the analysis of the overall and local irreplaceable nature. Through the analysis of the overall and local characteristics of fingerprint such as ridges, valleys, ending, characteristics of fingerprint such as ridges, valleys, ending, bifurcation points and ridge divergence points, we can extract bifurcation points and ridge divergence points, we can extract enough detail data. Such data is unique to the individual and enough detail data. Such data is unique to the individual and remains so throughout one’s life. We can use these data to identify remains so throughout one’s life. We can use these data to identify or verify a person operating as follows:  or verify a person operating as follows:  

Page 9: Biometric Fingerprint Attendance

(1) a digital image of one person’s fingerprint to be verified is (1) a digital image of one person’s fingerprint to be verified is captured; a feature extracting algorithm is carried out; minutiae captured; a feature extracting algorithm is carried out; minutiae are extracted and stored as a template for verifying later; are extracted and stored as a template for verifying later; people to be verified place his finger on the fingerprint sensor people to be verified place his finger on the fingerprint sensor so as to extracting the minutiae from the captured image; a so as to extracting the minutiae from the captured image; a matching algorithm is applied to matches the minutiae with the matching algorithm is applied to matches the minutiae with the stored template previously. The overall block diagram of thestored template previously. The overall block diagram of the

fingerprint verifying is shown in Figure below, fingerprint verifying is shown in Figure below,

Matching Matching ResultResult

Fingerprint Sensor Fingerprint Sensor

Extracting the Minutiae(image)

Extracting the Minutiae(image)

Store as a template in a database

Minutiae matching

Page 10: Biometric Fingerprint Attendance

2.2 Transmission Using Off-Line Technique:-2.2 Transmission Using Off-Line Technique:-

There are mainly two kinds of fingerprint attendance management There are mainly two kinds of fingerprint attendance management system on the market. One is on-line fingerprint attendance system on the market. One is on-line fingerprint attendance management system and the other is off-line fingerprint attendance management system and the other is off-line fingerprint attendance management system. On-line system always needs to connect with management system. On-line system always needs to connect with a PC or workstation and all the fingerprints’ templates of people to a PC or workstation and all the fingerprints’ templates of people to be verified must stored in the database in the PC or workstation. be verified must stored in the database in the PC or workstation. Thereby, matching fingerprints needs the support of the Thereby, matching fingerprints needs the support of the background PC. This kind of attendance management system is background PC. This kind of attendance management system is easy to paralysis in case of malfunctions of fingerprint attendance easy to paralysis in case of malfunctions of fingerprint attendance machines, transmission line or PC. Once several systems connect to machines, transmission line or PC. Once several systems connect to form a network, burden of PC and the response time of the system form a network, burden of PC and the response time of the system will be added. will be added.

And one off-line fingerprint attendance management system can And one off-line fingerprint attendance management system can finish all the process including capturing the image of fingerprint, finish all the process including capturing the image of fingerprint, extracting minutiae, storing and matching. All the operating of extracting minutiae, storing and matching. All the operating of matching fingerprint needn’t support of PC and the burden of PC is matching fingerprint needn’t support of PC and the burden of PC is lightened. The same systems can connect to form a 485 network lightened. The same systems can connect to form a 485 network and finally connect to the center PC of management system. So off-and finally connect to the center PC of management system. So off-line systems are widely used in many occasions. And the line systems are widely used in many occasions. And the shortcomings of this system are that there must be a managing PC shortcomings of this system are that there must be a managing PC nearly and it is difficult to lay the transmission lines where nearly and it is difficult to lay the transmission lines where topography is bad.topography is bad.

  

Page 11: Biometric Fingerprint Attendance

3. System Description3. System Description:-:-

3.1. Hardware: 3.1. Hardware:

A fingerprint sensor device along with an LCD screen is placed at the A fingerprint sensor device along with an LCD screen is placed at the entrance of Office room or staff room. The fingerprint sensor is used entrance of Office room or staff room. The fingerprint sensor is used to capture the fingerprints of staff members or employees while LCD to capture the fingerprints of staff members or employees while LCD screen notifies the members that his/her attendance has been screen notifies the members that his/her attendance has been marked.marked.

Page 12: Biometric Fingerprint Attendance

3.2. Software Tools: For the development of the system, the following software

tools were used BASCOM for AVR/8051 for programming Visual Basic for making software in the computer Proteus v7.0 for making the Layout of the circuit Diptrace for making the layout of the PCB

Page 13: Biometric Fingerprint Attendance

3.3. Rules for marking attendance: -I. Employees or staff members should scan his/her finger correctly on the fingerprint sensor as shown in Figure 2. If fingerprint is not enrolled correctly on reader as shown in Figure 3, it could lead to biometric error i.e. biometric device does not make perfect match decision.

Page 14: Biometric Fingerprint Attendance

There are two reasons for error Failure to enroll rate (FTE) and Failure to capture (FTC) rate of biometric device FTC rate depends on functionality of the system and FTE occur due to poor quality inputs.

Page 15: Biometric Fingerprint Attendance

3.4. Scenario of automatic attendance system:3.4. Scenario of automatic attendance system:--

Figure 4 shows the scenario of automatic attendance system Figure 4 shows the scenario of automatic attendance system attached to a main office or staff room. Database storage contains attached to a main office or staff room. Database storage contains the fingerprint templates of employees or staff members along with the fingerprint templates of employees or staff members along with their information (names, registration numbers and in-time, out-their information (names, registration numbers and in-time, out-time). When employees of staff members enrolls his/her finger on time). When employees of staff members enrolls his/her finger on the scanner his/her fingerprint is matched with database to mark the the scanner his/her fingerprint is matched with database to mark the attendance.attendance.

SENSOR SENSOR AND LCDAND LCD

Attendance ScanningAttendance Scanning UpdateUpdateDatabase StorageDatabase Storage Employees/Staff MembersEmployees/Staff Members

OFFICE ROOM

DATABASE

Page 16: Biometric Fingerprint Attendance

3.5. Implementation:-3.5. Implementation:-

Hardware equipment is placed at the door of Office room. Hardware equipment is placed at the door of Office room. Before entering the room employees or members are identified Before entering the room employees or members are identified through fingerprint scanner. On identification of a employee through fingerprint scanner. On identification of a employee his/her attendance is marked. his/her attendance is marked.

  

Following sequence of steps summarize the process of marking Following sequence of steps summarize the process of marking the attendance.the attendance.

Step 1:Step 1: Capture the student’s fingerprint sample and create a Capture the student’s fingerprint sample and create a feature set. A set of unique features created to match feature set. A set of unique features created to match fingerprint is called feature set. fingerprint is called feature set.

Step 2:Step 2: Retrieve the stored templates from the repository Retrieve the stored templates from the repository (database).(database).

Step 3:Step 3: Perform a one-to-n comparison between the fingerprint Perform a one-to-n comparison between the fingerprint feature set and the fingerprint templates stored in database, feature set and the fingerprint templates stored in database, make a decision of match or non-match.make a decision of match or non-match.

Page 17: Biometric Fingerprint Attendance

Step 4: If match is found retrieve student’s information (Registration number, Department, Subjects) from the database. Step 5: Obtain the scheduled lecture from the database and mark attendance if student is within the specified time i.e. within 30 minutes of the lecture’s starting time (see rules for detail). If verification is not done or there is some error in enrollment of fingerprint, system goes back to its initial state without marking the attendance.

Page 18: Biometric Fingerprint Attendance
Page 19: Biometric Fingerprint Attendance

Conclusion:-Conclusion:-

It can be concluded from the above discussion that a reliable, It can be concluded from the above discussion that a reliable, secure, fast and an efficient system has been developed secure, fast and an efficient system has been developed replacing a manual and unreliable system. This system can be replacing a manual and unreliable system. This system can be implemented in academic institutes for better results implemented in academic institutes for better results regarding the management of attendance. This system will regarding the management of attendance. This system will save time, reduce the amount of work the administration has save time, reduce the amount of work the administration has to do and will replace the stationery material with electronic to do and will replace the stationery material with electronic apparatus. Hence a system with expected results has been apparatus. Hence a system with expected results has been developed but there is still some room for improvement. developed but there is still some room for improvement.