ABSTRACT Fingerprint Verification Is One of the Most Reliable Personal Identification Methods

ABSTRACT Fingerprint Verification Is One of the Most Reliable Personal Identification Methods

ABSTRACT
Fingerprint verification is one of the most reliable personal identification methods in biometrics .With the rapid development of fingerprint verification, a number of its applications have been proposed until now including time attendance system etc. In this paper, a fingerprint attendance management system is designed and implemented .This system based biometrics and serial port communication technique solves the problem of spurious attendance and trouble of maintaining the register. It can make the users’ attendances more easily and effectively.
Key-Words: - fingerprint verification; biometrics attendance management
1 INTRODUCTION
While the move towards the digital era is being accelerated every hour, biometrics technologies have begun to affect people’s daily life more and more. Biometrics technologies verify identity through characteristics such as fingerprints, faces, irises, retinal patterns, palm prints, voice, hand-written signatures, and so on. These techniques, which use physical data, are receiving attention as a personal authentication method that is more convenient than conventional methods such as a password or ID cards. Biometric personal authentication uses data taken from measurements. Such data is unique to the individual and remains so throughout one’s life.
This technology has been applied for controlling access to high-security facilities, but it is now being widespread developed in information systems such as network, e-commerce, and retail applications. In these technologies, fingerprint becomes the most mature and popular biometrics technology used in automatic personal identification. In the beginning, fingerprint verifying used in the military affairs and in the criminal identification. But now, this technology is also being used in several other applications such as access control for high security installations, credit card usage verification, and employee identification.
The reason for the popularity of fingerprint verifying is that fingerprints satisfy uniqueness, stability, permanency and easily taking. Just for this, a number of fingerprint verification approaches have been proposed until now
This system is an application of the fingerprint verifying and serial port communication techniques and it is mainly used for employee identification. Through practices, this system is proved to be easy-to-use and effectively. And this paper is organized as follows. Section 2 describes the technological requirements for this system design. Section 3 outlines the functions of this system briefly and describes the hardware and software design of this system. Section 4 introduces some key problems in the implement of this system and finally Section 5 contains conclusions and future research plan.
EXISTING SYSTEM
Most of the attendance systems use paper based methods for taking and calculating attendance and this manual method requires paper sheets and a lot of stationery material. Previously a very few work has been done relating to the academic attendance monitoring problem. Some software’s have been designed previously to keep track of attendance. But they require manual entry of data by the staff workers. So the problem remains unsolved. Furthermore idea of attendance tracking systems using facial recognition techniques have also been proposed but it requires expensive apparatus still not getting the required accuracy.
2 Requirements for System Design
2.1 Authentication Using Fingerprints:-
A attendance management is an important part of companies management system. It can be in contact with salary of employee, work efficiency of company and even affects business image of company and staff morale. So the problem of reasonably, effectively and scientifically managing of staff attendances has become all companies facing issue. Traditional styles of attendance management include hand-written signatures, card bell, magnetic card, IC card and RF card attendance machines. These styles cannot avoid replacer checking out just because that people can be separated from cards.
The great advantage of the authentication using fingerprints is the irreplaceable nature. Through the analysis of the overall and local characteristics of fingerprint such as ridges, valleys, ending, bifurcation points and ridge divergence points, we can extract enough detail data. Such data is unique to the individual and remains so throughout one’s life. We can use these data to identify or verify a person operating as follows:
(1) a digital image of one person’s fingerprint to be verified is captured; a feature extracting algorithm is carried out; minutiae are extracted and stored as a template for verifying later; people to be verified place his finger on the fingerprint sensor so as to extracting the minutiae from the captured image; a matching algorithm is applied to matches the minutiae with the stored template previously. The overall block diagram of the
fingerprint verifying is shown in Figure below,
Matching Result
2.2 Transmission Using Off-Line Technique:-
There are mainly two kinds of fingerprint attendance management system on the market. One is on-line fingerprint attendance management system and the other is off-line fingerprint attendance management system. On-line system always needs to connect with a PC or workstation and all the fingerprints’ templates of people to be verified must stored in the database in the PC or workstation. Thereby, matching fingerprints needs the support of the background PC. This kind of attendance management system is easy to paralysis in case of malfunctions of fingerprint attendance machines, transmission line or PC. Once several systems connect to form a network, burden of PC and the response time of the system will be added.
And one off-line fingerprint attendance management system can finish all the process including capturing the image of fingerprint, extracting minutiae, storing and matching. All the operating of matching fingerprint needn’t support of PC and the burden of PC is lightened. The same systems can connect to form a 485 network and finally connect to the center PC of management system. So off-line systems are widely used in many occasions. And the shortcomings of this system are that there must be a managing PC nearly and it is difficult to lay the transmission lines where topography is bad.
3. System Description:-
3.1. Hardware:
A fingerprint sensor device along with an LCD screen is placed at the entrance of Office room or staff room. The fingerprint sensor is used to capture the fingerprints of staff members or employees while LCD screen notifies the members that his/her attendance has been marked.
3.2. Software Tools:
For the development of the system, the following software tools were used
Java Software Development Kit
Java IDE (Net Beans 6.5)
MySql Database
3.3. Rules for marking attendance: -
I. Employees or staff members should scan his/her finger correctly on the fingerprint sensor as shown in Figure 2. If fingerprint is not enrolled correctly on reader as shown in Figure 3, it could lead to biometric error i.e. biometric device does not make perfect match decision.
There are two reasons for error Failure to enroll rate (FTE) and Failure to capture (FTC) rate of biometric device FTC rate depends on functionality of the system and FTE occur due to poor quality inputs.
3.4. Scenario of automatic attendance system:-
Figure 4 shows the scenario of automatic attendance system attached to a main office or staff room. Database storage contains the fingerprint templates of employees or staff members along with their information (names, registration numbers and in-time, out-time). When employees of staff members enrolls his/her finger on the scanner his/her fingerprint is matched with database to mark the attendance.
SENSOR AND LCD Attendance Scanning Update Database Storage Employees/Staff Members
3.5. Implementation:-
Hardware equipment is placed at the door of Office room. Before entering the room employees or members are identified through fingerprint scanner. On identification of a employee his/her attendance is marked.
Following sequence of steps summarize the process of marking the attendance.
Step 1: Capture the student’s fingerprint sample and create a feature set. A set of unique features created to match fingerprint is called feature set.
Step 2: Retrieve the stored templates from the repository (database).
Step 3: Perform a one-to-n comparison between the fingerprint feature set and the fingerprint templates stored in database, make a decision of match or non-match.
Conclusion:-
It can be concluded from the above discussion that a reliable, secure, fast and an efficient system has been developed replacing a manual and unreliable system. This system can be implemented in academic institutes for better results regarding the management of attendance. This system will save time, reduce the amount of work the administration has to do and will replace the stationery material with electronic apparatus. Hence a system with expected results has been developed but there is still some room for improvement.
References:-
[1] D. Maltoni, D. Maio, A. K. Jain, S. Prabhaker, “Handbook of Fingerprint Recognition”, Springer, New York, 2003.
[2] A.C. Weaver, “Biometric authentication”, Computer, 39(2), pp 96-97 (2006).
[3] J. Ortega-Garcia, J. Bigun, D. Reynolds and J.Gonzalez-Rodriguez, “Authentication gets personal with biometrics”, Signal Processing Magazine, IEEE, 21(2), pp 50-62 (2004).
[4] Anil K. Jain, Arun Ross and Salil Prabhakar,” An introduction to biometric recognition”, Circuits and Systems for Video Technology, IEEE Transactions on Volume 14, Issue 1, Jan. 2004 Page(s):4 – 20.
[5] Fakhreddine Karray, Jamil Abou Saleh, Mo Nours Arab and Milad Alemzadeh,, “Multi Modal Biometric Systems: A State of the Art Survey” , Pattern Analysis and Machine Intelligence Laboratory, University of Waterloo, Waterloo, Canada.
[6] Abdulmotaleb El Saddik, Mauricio Orozco, Yednek Asfaw, Shervin Shirmohammadi and Andy Adler “A Novel Biometric System for Identification and Verification of Haptic Users”, Multimedia Communications Research Laboratory (MCRLab) School of Information Technology and Engineering University of Ottawa, Ottawa, Canada.
[7] H. C. Lee and R. E. Gaensslen, “Advances in Fingerprint Technology”, Elsevier, New York.
[8] Sharath Pankanti, Salil Prabhakar, Anil K. Jain, “On the Individuality of Fingerprints”, IEEE transaction on pattern analysis and machine intelligence, vol.24, no.8, august 2002.
[9] Federal Bureau of Investigation, “The Science of Fingerprints: Classification and Uses”, U. S. Government Printing Office, Washington, D. C., 1984.
[10] H. C. Lee and R. E. Gaensslen (eds.), “Advances in Fingerprint Technology”, Second Edition, CRC Press, New York, 2001. [11] K.G.M.S.K. Jayawardana, T.N. Kadurugamuwa, R.G. Rage and S. Radhakrishnan”, Timesheet: An Attendance Tracking System”, Proceedings of the Peradeniya University Research Sessions, Sri Lanka, Vol.13, Part II, 18th December 2008.
[12] Yohei KAWAGUCHI, Tetsuo SHOJI , Weijane LIN ,Koh KAKUSHO , Michihiko MINOH ,“Face Recognition-based Lecture Attendance System”, Department of Intelligence Science and Technology, Graduate School of Informatics, Kyoto University. Academic Center for Computing and Media Studies, Kyoto University
Reference: