Вы находитесь на странице: 1из 4

See

discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/261148609

Biometric attendance system


CONFERENCE PAPER MAY 2011
DOI: 10.1109/ICCME.2011.5876792

CITATIONS

READS

602

2 AUTHORS, INCLUDING:
Imran Anwar Ujan
International Islamic University Malaysia
8 PUBLICATIONS 13 CITATIONS
SEE PROFILE

Available from: Imran Anwar Ujan


Retrieved on: 15 February 2016

Proceedings of the 20 1 1 IEEEIICME


International Conference on Complex Medical Engineering
May 22 - 25,Harbin,China

Biometric Attendance System


Engr. Imran Anwar Ujan and Dr. Imdad Ali Ismaili
Institute of Information & Communication Technology,
University ofSindh, Jamshoro, Sindh, Pakistan
Pakistan
Abstract - This research work has application for attendance
system of employer's and students in general. The system will
facilitate institutions! organization to make attendance individual
in time along with data information thumb impression will be

junction. In this research, we will be dealing mainly with ridge


endings and bifurcations.
There
literature

taken as a signature for the system entry. Main design and


challenge in this system is the design of database architecture and
its business logic.

Once

in

determining

this

system

would

test

experiments on the database to estimate the number of degrees


of freedom within the fingerprint popUlation.

Problem
There

BACKGROUND/CONTEXT

identification

devices.

systems

Despite

the

such

as

widespread

some

problems

which

face

by

fingerprint

touching a biometric system (fingerprint).

civilian
use

are

recognition or identification security. We can catch a cold by

Fingerprints are the oldest form of biometric identification.


biometric

been

fingerprint features and then performing a set of matching

whether

Modem fingerprint based identification is used in forensic


in

has

defined a means of forming a binary code from set of

being able to fully test hypothesis.

and

technique

system performance has been presented. Tu and Hartley

the

expected that the work in this system will reach the stage of

science,

extraction

The work of Tu and Hartley and Pankanti et al. can be

attendance by fingerprint is enough for identification. It is

II.

minutiae

examined in which a statistical framework for analyzing

statistical uniqueness of fingerprint minutiae.


that

a reliable

statistical analysis of fingerprint minutiae.

The results from these experiments can be used to help us

aim

in

minutiae

implemented and tested, this can be used as the basis of

experiments can then be performed on the fingerprint data set.

main

proposed
and

the enhancement algorithm works and how well it performs.

In combination with these development techniques, statistical

The

approaches

et al. will be evaluated and implemented to understand how

be evaluated on a fingerprint data set.

involved

of

enhancement,

approach to develop for this research. In particular, the

minutiae extraction. The performance of these techniques will

is

types

image

fingerprint image enhancement algorithm employed by Hong

reliable techniques for fingerprint image enhancement and

what

both

extraction from fingerprints. The literature on these techniques

The aim of this system is to implement in C#.net set of

understand

various

will be examined are reviewed in determining the best

I. AIMS AND OBJECTIVE

better

are
for

Twins

have

identical

biometric

traits

(identical

fingerprints, irises ... ). This is the same clones.

of

fingerprints, there is little statistical theory on the uniqueness

Stolen body parts can be reused.

of fingerprint minutiae.

Biometric features can be reconstructed from the

Making a fake finger is easy.

A fingerprint is formed from an impression on a surface of

template.

composite curve segments. A ridge is defined as a single


curved segment, and a valley is the region between two
adjacent

ridges.

The

minutiae,

which

are

the

local

The inability of fingerprint systems to enroll children and

discontinuities in the ridge flow pattern, provide the details of

small Asian women.

the ridge-valley structures, like ridge endings and bifurcations.

III. PROJECT SPECIFICATION

There are 50 to 150 minutiae on a single fingerprint image.


Features such as the type, direction, and location of minutiae

A.

are taken into account when performing minutiae extraction.


The work of F.Galton defined a set of Galton Features for

through fingerprint. The project is design and implements

fingerprint identification, which since then, has been refines


and

extended

to

include

additional

types

of

software architecture for fingerprint analysis. The system

fingerprint

should be able to extract key features

features. However, most of these features are not used in

from a scanned

fingerprint image and to compare these with a database of

automatic fingerprint identification systems. Instead the set of

known fingerprint images and/or extracted feature sets.

minutiae types are restricted into only two types, ridge endings

For this project we provided with a set of previously

and bifurcations, as other types of minutiae can be expressed

acquired fingerprints and a working fingerprint sensor with

in terms of these two features types. Ridge endings are the

driver software for Windows. Our expectation had fulfilled by

points where the ridge curves terminates, and bifurcations are

most of the algorithm development which executed in C# dot

where a ridge splits from a single path to two paths at a Y-

978-1-4244-9324-1/11/$26.00 2011 IEEE

Project Description
The goal of this project is to daily attendance of employee

net and this work done on a Windows PC.

499

B.

of project parameters are tentative, the plan will always need

Project Task

to be modified.

The project can be split into a set of principle tasks


representing a progression towards the end goal of a working

1.

structure

of

We had must reviewed techniques for analyzing

and

algorithms/ techniques had implemented in C# .net

A.

fingerprint image provided.


Attendance

System

software

architecture for the main system was designed; the

set

and

several

of

the

which

affect

the

project

Attendance by fingerprint

Protect

the

proxy

which

IS

doing

III

B.

functional

Budget
1.

Veridicom Fingerprint Sensor RS.8,500

integrated with the fingerprint sensor, and real-time

2.

Expenditure

analyzed

algorithms

and

were

analysis

of

implemented
a

fingerprint

was
3.

and implemented and demonstrated.


be

achieved

through

image

C.

processing;

and

Total budget is Rs. 1 1 ,000

Examine and review available literature on image

Develop a series of image enhancement techniques to

Develop a set of reliable techniques to extract the

aid the minutiae extraction process.

through various pattern recognition approaches; the


several

data

Methods

statistical or mathematical approaches.


Improvements in pattern matching may be achieved
evaluate

of

enhancement and minutiae extraction techniques.

enhanced composite image; or more sophisticated

should

collection

A rough task breakdown for this project is as follows:

combining multiple acquired images to provide an

students

for

information Rs.2500

Improvements in the analysis of an acquired image


may

daily

Constraints

and

We

acquisition

5.

constraints

Computerize the daily attendance system

demonstrated; an improvements in processing speed


4.

the

attendance

subsystems were implemented.


3.

out

method of implementing a full system was evaluated;


architecture

is

Objectives

main subsystems required were determined and a


work

plan

management.

and initial testing performed on the test set of


Biometric

development

Here we describe the brief objectives of the BAS project

sets of fingerprints. Several of the most promising

The

software

IV. INTRODUCTION

fingerprints and performing pattern recognition on

2.

BAS

described below

fingerprint analysis system.

minutiae from fingerprint images.

approaches,

developing an evaluation methodology which enables

Evaluate the performance of the techniques using the


fingerprint data set.

a comparison in terms of improved recognition and a

reduction in terms of false positives and negatives.

Use

existing

comparing

techniques

the

as

the

performance

of

benchmark
the

for

technique

developed.

Integrating the techniques of 4 and 5 with the real-time


acquisition of fingerprints will add significant bonus value.

After reliable minutiae detection techniques have


been developed and tested, then statistical analysis

C.

Project Planning

experiments on

Effective management of a software project depends on


thoroughly

planning

the

progress

of

the

project.

the fingerprint data

set

performed and documented.

We

anticipated problems which arose and prepared solutions to

(Employee Fingerprint Table)

the project problems. A plane, drawn up of a project, we used

EmpfPrlnt

as the driver for the project. The initial plane evolves as the

[j]EWlD
O FPRlNT

project progress and better information.


The planning process starts with an assessment of the
constraints

(required

delivery

date,

overall

budget,

etc)

(Attendance Table)

(Employee Profile Table)

affecting the project. This is carried out in conjunction with an


estimation of project parameters such as its structure, size, and
distribution

of

functions.

The

progress

milestones

and

deliverables are then defined. The process then enters a loop.


A schedule for the project is drawn up and the activities
defined in the schedule are initiated or given permission to

Fig.1

continue. After some time usually about 2-3 weeks, progress


is reviewed and discrepancies noted. Because initial estimates

500

can

be

orientation and ridge frequency parameters. However, in


practice,

this

fingerprint

does

not

matching

pose

significant

techniques

generally

limitation
place

as

more

emphasis on the well-defined regions, and will disregard and


image if it is severely corrupted.
Overall, the results have shown that the implemented

(Fail)

enhancement algorithm is a useful step to employ prior to


minutiae extraction. The Crossing Number method was then
implemented to perform extraction of minutiae. Experiments
conducted have shown that this method is able to accurately
detect all valid regions, and will disregard an image if it is
severely corrupted.
However, there are cases where the extracted minutiae do
not correspond to true minutiae. Hence, an image post
processing stage is implemented to validate the minutiae. The
experimental results from the minutiae validation algorithm

(a). Flow

Chart of

indicate that this additional post processing stage is effective

Fingerprint

in eliminating various types of false minutiae structures.


In combination with the implemented techniques for image
enhancement

and

minutiae

extraction,

preliminary

experiments on the statistics of fingerprints were conducted on


a sample set of fingerprint images. Three types of statistical
data were collected, which include minutiae density, distance
between neighboring minutiae, and ridge wavelength.
Overall, we have implemented a set of reliable techniques
for

fingerprint

image

enhancement,

minutiae

extraction

fingerprint matching and classification. These techniques we

Databue Fingerprint

implemented for employer daily attendance system. Through


which employers attend you by fingerprint only enter their
employer ID and put his finger on sensor.
V.
Our project
(BEAS)"

coming technologies in the various demanding directions.


The language which we have is very vast and even the under

Project Evalution

Microsoft products is trying to rule over the Information

The primary focus of the work in this project is on the


of

fingerprint

images,

and

the

Technology, So we hope that this project will be the point of

subsequent

interest for our successors to be enhanced further to market it

extraction of minutiae.

compatible

Firstly, we have implemented a series of techniques for


Experiments

were

then

conducted

using

[I]

the implemented algorithm.

The

use of

synthetic images ha provided a more quantative measures of


inspection, but can provide a more realistic evaluation as they
provide a natural representation of fingerprint imperfections
such as noise and corrupted elements. The experimental
results have shown that combined with an accurate estimation
of the orientation and ridge frequency; the Gabor filter is able
to effectively enhance the clarity of the ridge structures while
reducing noise. In contrast, for low quality images that exhibit
high

intensities

of

noise,

the

filter

is

less

effective

demands

of

the

organization

Amengual, J.C, Juan, A, Perz, J.e., Prat, F, SEZ, S., and Villar, J, M,
"Real time minutiae extraction in fingerprint images", proceedings of
6th International conference on Image Processing and its Applications ,
Jully 1997,pp 87 1-875
[2] Dankmeijer, J., Waltman, J.M, and Wild, AG.D "Biological foundations
for forensic identification based on fingerprints." Acta Morphological
Neerlando scandivancia 18,1 (1980),67-83
[3] Guo, Z, and Hall, R.W "Parallel thinning with two-sub iteration
algorithms", communications of the ACM 32,3 (March 1989),359-373.
[4] Hong, L, Wan, Y and Jain, A.K."Fingerprint image enhancement:
Algorithm and performance evaluation", IEEE transactions on Pattern
Analysis and Machine Intelligence 20, 8(1998),777-789.

images in order to provide a well-balanced evaluation on the


of

the

REFERENCES

combination of both synthetic test images and real fingerprint


performance

with

requirements.

fingerprint image enhancement to facilitate the extraction of


minutiae.

Employer Attendance System

there is a lot of improvement work and flexibility for the

Fig.2 ERD Model & Flow Charts of Systems

enhancement

"Biometric

is an extensible work for any organization or

company in this fast world. Keeping the view of research still

ce)
(b). Flow Chart of Fingerprint Matching (Attendan

D.

CONCLUSION

in

enhancing the image due to inaccurate estimation of the

50 1

Вам также может понравиться