Biometric Fingerprint Attendance Management System.

Slides:



Advertisements
Similar presentations
pan Testing Centers I-9 Training
Advertisements

RFID Access Control System March, 2003 Softrónica.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
is a customized integrated application system designed specifically for RTU to automate the school’s diverse operations. It is divided into different.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Department of Labor HSPD-12
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
By: Monika Achury and Shuchita Singh
Gateplus Time Attendance and Access Control System.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
FIT3105 Biometric based authentication and identity management
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometrics: Identity Verification in a Networked World
Marjie Rodrigues
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Authentication Approaches over Internet Jia Li
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
Introduction to Biometric Systems
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
System Analysis and Design
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Physical security By Ola Abd el-latif Abbass Hassan.
TimeLink Time and Attendance Software A Software Application to Replace the Current Paper Based, Manual Process Personal and Academic Excellence Inspired.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
Biometrics Security in Banking Systems Image processing in ATM
Mandava Institute of Engineering and Technology
Transaction processing systems
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Classroom Attendance System
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
Biometric Security Palm Vein Technology
Seminar Presentation on Biometrics
Margaret Brown 3rd period October 14, 2007
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
Biometrics , Computer & Network Security 1
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometric Fingerprint Attendance Management System

A PROJECT REPORT ON A PROJECT REPORT ON BIOMETRIC FINGERPRINT ATTENDANCE MANAGEMENT SYSTEM For For Enter Company Name, PUNE Enter Company Name, PUNE SUBMITTED TO SUBMITTED TO UNIVERSITY OF PUNE UNIVERSITY OF PUNE SUBMITTED IN PARTIAL FULFILLMENT OF THE SUBMITTED IN PARTIAL FULFILLMENT OF THE MASTER OF COMPUTER ADMINISTRATION MASTER OF COMPUTER ADMINISTRATION BY BY Enter Your Full Name Enter Your Full Name (MCA-III ) (MCA-III ) Enter Your College Name Enter Your College Name

ABSTRACT Fingerprint verification is one of the most reliable personal identification methods in biometrics.With the rapid development of fingerprint verification, a number of its applications have been proposed until now including time attendance system etc. In this paper, a fingerprint attendance management system is designed and implemented.This system based biometrics and serial port communication technique solves the problem of spurious attendance and trouble of maintaining the register. It can make the users’ attendances more easily and effectively. Key-Words: - fingerprint verification; biometrics attendance management

1 INTRODUCTION While the move towards the digital era is being accelerated every hour, biometrics technologies have begun to affect people’s daily life more and more. Biometrics technologies verify identity through characteristics such as fingerprints, faces, irises, retinal patterns, palm prints, voice, hand-written signatures, and so on. These techniques, which use physical data, are receiving attention as a personal authentication method that is more convenient than conventional methods such as a password or ID cards. Biometric personal authentication uses data taken from measurements. Such data is unique to the individual and remains so throughout one’s life. This technology has been applied for controlling access to high-security facilities, but it is now being widespread developed in information systems such as network, e-commerce, and retail applications. In these technologies, fingerprint becomes the most mature and popular biometrics technology used in automatic personal identification. In the beginning, fingerprint verifying used in the military affairs and in the criminal identification. But now, this technology is also being used in several other applications such as access control for high security installations, credit card usage verification, and employee identification.

The reason for the popularity of fingerprint verifying is that fingerprints satisfy uniqueness, stability, permanency and easily taking. Just for this, a number of fingerprint verification approaches have been proposed until now The reason for the popularity of fingerprint verifying is that fingerprints satisfy uniqueness, stability, permanency and easily taking. Just for this, a number of fingerprint verification approaches have been proposed until now This system is an application of the fingerprint verifying and serial port communication techniques and it is mainly used for employee identification. Through practices, this system is proved to be easy-to-use and effectively. And this paper is organized as follows. Section 2 describes the technological requirements for this system design. Section 3 outlines the functions of this system briefly and describes the hardware and software design of this system. Section 4 introduces some key problems in the implement of this system and finally Section 5 contains conclusions and future research plan.

EXISTING SYSTEM Most of the attendance systems use paper based methods for taking and calculating attendance and this manual method requires paper sheets and a lot of stationery material. Previously a very few work has been done relating to the academic attendance monitoring problem. Some software’s have been designed previously to keep track of attendance. But they require manual entry of data by the staff workers. So the problem remains unsolved. Furthermore idea of attendance tracking systems using facial recognition techniques have also been proposed but it requires expensive apparatus still not getting the required accuracy.

2 Requirements for System Design 2.1 Authentication Using Fingerprints:- A attendance management is an important part of companies management system. It can be in contact with salary of employee, work efficiency of company and even affects business image of company and staff morale. So the problem of reasonably, effectively and scientifically managing of staff attendances has become all companies facing issue. Traditional styles of attendance management include hand-written signatures, card bell, magnetic card, IC card and RF card attendance machines. These styles cannot avoid replacer checking out just because that people can be separated from cards. The great advantage of the authentication using fingerprints is the irreplaceable nature. Through the analysis of the overall and local characteristics of fingerprint such as ridges, valleys, ending, bifurcation points and ridge divergence points, we can extract enough detail data. Such data is unique to the individual and remains so throughout one’s life. We can use these data to identify or verify a person operating as follows: The great advantage of the authentication using fingerprints is the irreplaceable nature. Through the analysis of the overall and local characteristics of fingerprint such as ridges, valleys, ending, bifurcation points and ridge divergence points, we can extract enough detail data. Such data is unique to the individual and remains so throughout one’s life. We can use these data to identify or verify a person operating as follows:

(1) a digital image of one person’s fingerprint to be verified is captured; a feature extracting algorithm is carried out; minutiae are extracted and stored as a template for verifying later; people to be verified place his finger on the fingerprint sensor so as to extracting the minutiae from the captured image; a matching algorithm is applied to matches the minutiae with the stored template previously. The overall block diagram of the fingerprint verifying is shown in Figure below, Matching Result Matching Result Fingerprint Sensor Extracting the Minutiae(image) Store as a template in a database Minutiae matching

2.2 Transmission Using Off-Line Technique:- There are mainly two kinds of fingerprint attendance management system on the market. One is on-line fingerprint attendance management system and the other is off-line fingerprint attendance management system. On-line system always needs to connect with a PC or workstation and all the fingerprints’ templates of people to be verified must stored in the database in the PC or workstation. Thereby, matching fingerprints needs the support of the background PC. This kind of attendance management system is easy to paralysis in case of malfunctions of fingerprint attendance machines, transmission line or PC. Once several systems connect to form a network, burden of PC and the response time of the system will be added. And one off-line fingerprint attendance management system can finish all the process including capturing the image of fingerprint, extracting minutiae, storing and matching. All the operating of matching fingerprint needn’t support of PC and the burden of PC is lightened. The same systems can connect to form a 485 network and finally connect to the center PC of management system. So off-line systems are widely used in many occasions. And the shortcomings of this system are that there must be a managing PC nearly and it is difficult to lay the transmission lines where topography is bad.

3. System Description: Hardware: 3.1. Hardware: A fingerprint sensor device along with an LCD screen is placed at the entrance of Office room or staff room. The fingerprint sensor is used to capture the fingerprints of staff members or employees while LCD screen notifies the members that his/her attendance has been marked.

3.2. Software Tools: For the development of the system, the following software tools were used Java Software Development Kit Java IDE (Net Beans 6.5) MySql Database

3.3. Rules for marking attendance: - I. Employees or staff members should scan his/her finger correctly on the fingerprint sensor as shown in Figure 2. If fingerprint is not enrolled correctly on reader as shown in Figure 3, it could lead to biometric error i.e. biometric device does not make perfect match decision.

There are two reasons for error Failure to enroll rate (FTE) and Failure to capture (FTC) rate of biometric device FTC rate depends on functionality of the system and FTE occur due to poor quality inputs.

3.4. Scenario of automatic attendance system:- Figure 4 shows the scenario of automatic attendance system attached to a main office or staff room. Database storage contains the fingerprint templates of employees or staff members along with their information (names, registration numbers and in-time, out-time). When employees of staff members enrolls his/her finger on the scanner his/her fingerprint is matched with database to mark the attendance. SENSOR AND LCD Attendance Scanning Update Database StorageEmployees/Staff Members SENSOR AND LCD Attendance Scanning Update Database StorageEmployees/Staff Members OFFICE ROOM DATABASE

3.5. Implementation:- Hardware equipment is placed at the door of Office room. Before entering the room employees or members are identified through fingerprint scanner. On identification of a employee his/her attendance is marked. Hardware equipment is placed at the door of Office room. Before entering the room employees or members are identified through fingerprint scanner. On identification of a employee his/her attendance is marked. Following sequence of steps summarize the process of marking the attendance. Step 1: Capture the student’s fingerprint sample and create a feature set. A set of unique features created to match fingerprint is called feature set. Step 1: Capture the student’s fingerprint sample and create a feature set. A set of unique features created to match fingerprint is called feature set. Step 2: Retrieve the stored templates from the repository (database). Step 3: Perform a one-to-n comparison between the fingerprint feature set and the fingerprint templates stored in database, make a decision of match or non-match.

Step 4: If match is found retrieve student’s information (Registration number, Department, Subjects) from the database. Step 5: Obtain the scheduled lecture from the database and mark attendance if student is within the specified time i.e. within 30 minutes of the lecture’s starting time (see rules for detail). If verification is not done or there is some error in enrollment of fingerprint, system goes back to its initial state without marking the attendance.

Conclusion:- Conclusion:- It can be concluded from the above discussion that a reliable, secure, fast and an efficient system has been developed replacing a manual and unreliable system. This system can be implemented in academic institutes for better results regarding the management of attendance. This system will save time, reduce the amount of work the administration has to do and will replace the stationery material with electronic apparatus. Hence a system with expected results has been developed but there is still some room for improvement. It can be concluded from the above discussion that a reliable, secure, fast and an efficient system has been developed replacing a manual and unreliable system. This system can be implemented in academic institutes for better results regarding the management of attendance. This system will save time, reduce the amount of work the administration has to do and will replace the stationery material with electronic apparatus. Hence a system with expected results has been developed but there is still some room for improvement.

References:- References:- [1] D. Maltoni, D. Maio, A. K. Jain, S. Prabhaker, “Handbook of Fingerprint Recognition”, Springer, New York, [1] D. Maltoni, D. Maio, A. K. Jain, S. Prabhaker, “Handbook of Fingerprint Recognition”, Springer, New York, [2] A.C. Weaver, “Biometric authentication”, Computer, 39(2), pp (2006). [2] A.C. Weaver, “Biometric authentication”, Computer, 39(2), pp (2006). [3] J. Ortega-Garcia, J. Bigun, D. Reynolds and J.Gonzalez-Rodriguez, “Authentication gets personal with biometrics”, Signal Processing Magazine, IEEE, 21(2), pp (2004). [3] J. Ortega-Garcia, J. Bigun, D. Reynolds and J.Gonzalez-Rodriguez, “Authentication gets personal with biometrics”, Signal Processing Magazine, IEEE, 21(2), pp (2004). [4] Anil K. Jain, Arun Ross and Salil Prabhakar,” An introduction to biometric recognition”, Circuits and Systems for Video Technology, IEEE Transactions on Volume 14, Issue 1, Jan Page(s):4 – 20. [4] Anil K. Jain, Arun Ross and Salil Prabhakar,” An introduction to biometric recognition”, Circuits and Systems for Video Technology, IEEE Transactions on Volume 14, Issue 1, Jan Page(s):4 – 20. [5] Fakhreddine Karray, Jamil Abou Saleh, Mo Nours Arab and Milad Alemzadeh,, “Multi Modal Biometric Systems: A State of the Art Survey”, Pattern Analysis and Machine Intelligence Laboratory, University of Waterloo, Waterloo, Canada. [5] Fakhreddine Karray, Jamil Abou Saleh, Mo Nours Arab and Milad Alemzadeh,, “Multi Modal Biometric Systems: A State of the Art Survey”, Pattern Analysis and Machine Intelligence Laboratory, University of Waterloo, Waterloo, Canada. [6] Abdulmotaleb El Saddik, Mauricio Orozco, Yednek Asfaw, Shervin Shirmohammadi and Andy Adler “A Novel Biometric System for Identification and Verification of Haptic Users”, Multimedia Communications Research Laboratory (MCRLab) School of Information Technology and Engineering University of Ottawa, Ottawa, Canada. [6] Abdulmotaleb El Saddik, Mauricio Orozco, Yednek Asfaw, Shervin Shirmohammadi and Andy Adler “A Novel Biometric System for Identification and Verification of Haptic Users”, Multimedia Communications Research Laboratory (MCRLab) School of Information Technology and Engineering University of Ottawa, Ottawa, Canada.

[7] H. C. Lee and R. E. Gaensslen, “Advances in Fingerprint Technology”, Elsevier, New York. [7] H. C. Lee and R. E. Gaensslen, “Advances in Fingerprint Technology”, Elsevier, New York. [8] Sharath Pankanti, Salil Prabhakar, Anil K. Jain, “On the Individuality of Fingerprints”, IEEE transaction on pattern analysis and machine intelligence, vol.24, no.8, august [8] Sharath Pankanti, Salil Prabhakar, Anil K. Jain, “On the Individuality of Fingerprints”, IEEE transaction on pattern analysis and machine intelligence, vol.24, no.8, august [9] Federal Bureau of Investigation, “The Science of Fingerprints: Classification and Uses”, U. S. Government Printing Office, Washington, D. C., [9] Federal Bureau of Investigation, “The Science of Fingerprints: Classification and Uses”, U. S. Government Printing Office, Washington, D. C., [10] H. C. Lee and R. E. Gaensslen (eds.), “Advances in Fingerprint Technology”, Second Edition, CRC Press, New York, [11] K.G.M.S.K. Jayawardana, T.N. Kadurugamuwa, R.G. Rage and S. Radhakrishnan”, Timesheet: An Attendance Tracking System”, Proceedings of the Peradeniya University Research Sessions, Sri Lanka, Vol.13, Part II, 18th December [10] H. C. Lee and R. E. Gaensslen (eds.), “Advances in Fingerprint Technology”, Second Edition, CRC Press, New York, [11] K.G.M.S.K. Jayawardana, T.N. Kadurugamuwa, R.G. Rage and S. Radhakrishnan”, Timesheet: An Attendance Tracking System”, Proceedings of the Peradeniya University Research Sessions, Sri Lanka, Vol.13, Part II, 18th December [12] Yohei KAWAGUCHI, Tetsuo SHOJI, Weijane LIN,Koh KAKUSHO, Michihiko MINOH,“Face Recognition-based Lecture Attendance System”, Department of Intelligence Science and Technology, Graduate School of Informatics, Kyoto University. Academic Center for Computing and Media Studies, Kyoto University [12] Yohei KAWAGUCHI, Tetsuo SHOJI, Weijane LIN,Koh KAKUSHO, Michihiko MINOH,“Face Recognition-based Lecture Attendance System”, Department of Intelligence Science and Technology, Graduate School of Informatics, Kyoto University. Academic Center for Computing and Media Studies, Kyoto University