fbpx

Fingerprint Database Management System

Download Full-Text PDF Cite this Publication

Text Only Version

Fingerprint Database Management System

U. Siva Reddy 1, B.Rajasekhar2, Dr.M.kamaraju3, Dr.B.Ananda Krishna4

1Student, M.Tech, DECS, Gudlavalleru Engineering College, Gudlavalleru,

2Associate Professor, ECE Department, Gudlavalleru Engineering College, Gudlavalleru,

3Professor&H.O.D, ECE Department, Gudlavalleru Engineering College, Gudlavalleru,

4Professor, ECE Department, Gudlavalleru Engineering College, Gudlavalleru.

Email:1sivaredygec@gmail.com,2surajb2000@gmail.com,

3madduraju@yahoo.com,4anand_bk@rediffmail.com

Abstract This project aims at providing an easy and time saving attendance system that verifies the employees attendance system at an organization using their fingerprint during the attendance time. When a employee is first enrolled in a fingerprint- based biometric attendance system, the software records a template of the employees fingerprint using a scanner and associates that template with the employees ID number. This template measures the relationship between various points in the fingerprint. At the time of attendance, the system verifies that the newly scanned fingerprint matches the template originally stored for that ID number. If there is a match, the punch is recorded. The fingerprints are matched using minutia based fingerprint image matching algorithm. The system will eliminate buddy punching. It will efficiently replace the manually maintained records and the conventional time consuming way of mar ki ng attendance . The system may al so record the empl oyee s outgoing and incoming time during the days, thus facilitating organizations. The basic inputs are obtained from user during the registration and verification stages.

Keywords Biometric; Fingerprint; Recognition; Matlab.

  1. INTRODUCTION

    Biometrics is an automated method of recognizing a person based on a physiological or behavioural characteristic. Among the features measured are: face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Fingerprint biometrics is a dynamic technology that is being adopted into new markets and applications at a rapidly increasing pace. Depending on the applications, users can simply touch or slide their finger over a sensor for access to their PCs, wireless devices, workplaces or home. These tiny sensors lock out any unauthorized individual while allowing a convenient way for the registered user to replace passwords for system login and grant access to the application. A biometric system can be operated in two modes:1) verification mode and 2) identification mode. A biometric system operating in the verification mode either accepts or rejects a users claimed identity while a biometric system operating in the identification mode establishes the identity of the user without claimed identity information. In this work, we have focused only on a biometric system operating in the verification mode.

    An attendance system is designed to automate the employee attendance procedure in the o r g a n i za t i o n using the automatic fingerprint verification technology.

    Featuring an i n t e r a ct i v e , e a s y-to-use interface, the s ys t e m d r a m a t i c a l l y reduces the number of days required to maintain records and the burden of organizations.

    Fingerprint an Overview

    A fingerprint, as the name suggests is the print or the impression made by our finger because of the patterns formed on the skin of our palms and fingers since birth. With age, these marks get prominent but the pattern and the structures present in those fine lines do not undergo any change. Because of their permanence and unique nature, they have been used in criminal and forensic cases for a long time [2].

    Fig. 1 Fingerprint Image

    A fingerprint is composed of many ridges and furrows. These ridges and furrows present good similarities in each small local window, like parallelism and average width. The fingerprints are not distinguished by their ridges and furrows (valleys), but by features called Minutia. The Minutia refers to some abnormalities in a ridge. Minutia is an important characteristic of a ridge. The most prominent two minutia points are

    • Ridge termination means the sudden or abrupt ending of the ridge.

    Fig. 2 Ridge Termination Minutia

    • Ridge bifurcation is the point on the ridge where a ridge is divided into two separate ridges.

    Fig. 3 Ridge Bifurcation Minutia

    D. Fingerprint Recognition

    The recognition procedure can be broadly sub grouped into

    1. Fingerprint Identification: It refers to specifying ones identity based on his fingerprints. The fingerprints are captured without any information about the identity of the person. It is then matched across a database containing numerous fingerprints. The identity is only retrieved when a match is found with one existing in the database. So, this is a case of one-to-n matching where one capture is compared to several others. This is widely used for criminal cases [3].

    2. Fingerprint Verification: It is different from identification in a way that the persons identity is stored along with the fingerprint in a database. On enrolling the fingerprint, the real time capture will retrieve back the identity of the person. This is however a one-to-one matching. This is used in offices like passport offices etc. where the identity of a person has to be checked with the one provided at previous stage [3].

  2. EXISTING SYSTEM

    Marking of attendance is a tedious and time consuming process. At present this is done manually. It is necessary to record details about every

    The supervisor acts as administrator. Administrator has t he pri vi l eges to add, view and delete employee records. He can also view the reports of attendance marked .He has to provide details of employee who have applied for leave/permission. Thereby such employees login is blocked during the period of their leave.

    During the attendance time, each employee has to provide his/her ID number and the fingerprint template. The template stored corresponding to the ID number and the one provided are matched using a fingerprint matching algorithm that extracts features from both the templates. If there is a match the attendance is recorded. Administrator can check the list of employees who have not mark their attendance within the stipulated time.

    1. Advantages Of Proposed System

      • Easy and time-saving

      • Provides complete administrative control, monitoring, enrollment, record management and reporting functions

      • Eliminates buddy punching

      • Reduces administrative costs associated with issuing attendance registers

    2. Block Diagram of proposed system

    e mpl oye e on a daily basis. Usually the management allots an in-time for the employee; say around 9P.M after which they can enter only if they had obtained permission. The registers have to be regularly updated when employee choose to go on a leave or seek permission for late arrivals Because of the huge strength of the o r g a n i z a t i o n s it is not possible for the organizations to personally identity every

    Identifica tion

    Databas

    Enrolm ent

    Verific ation

    employee, thus proxies can occur. In an effort to maintain orderliness.

    1. Disadvantages

      • Time consuming.

      • Difficult to update in cases where students vacate or shift to other r o o m /hostel because registers are used to record attendance and are renewed only on a monthly basis.

      • Error prone and susceptible to proxy.

      • Difficulties in supervision.

  3. PROPOSED SYSTEM

    We propose a three module system where a database in MS access is already created. It stores the student details such as ID, name, department, college name etc along with their fingerprint template.ID is used as primary key which uniquely identifies each student. The system database consists of a collection of records, each of which corresponds to organizations. Each record contains the following fields: Name of the person, ID, number of leaves, department ,college name, contact number, address etc. along with templates of the persons fingerprint and other personal details of the students. There are two users for this system

    1. Administrator.

    2. Employee.

    Administrator login is password protected.

    Fig. 4 Block Diagram of Proposed Fingerprint Database Management System

    1. Identification Module: It refers to specifying ones identity based on his fingerprints. The fingerprints are captured without any information about the identity of the person. It is then matched across a database containing numerous fingerprints. The identity is only retrieved when a match is found with one existing in the database. So, this is a case of one-to-n matching where one capture is compared to several others. This is widely used for criminal cases [3].

    2. Verification Module: This phase involves identifying the employee. Using a minutia based algorithm that captures both local and global features of the fingerprint, the registered image retrieved from database against the id provided by the employee and the one provided during the attendance time is matched and the attendance is marked by setting a flag. For those on leave, the flag remains unset during the period of their absence. This flag helps in obtaining the attendance reports.

    3. Enrolment module: All the employees have to register with the system in order to use it. Under the administrator login, every employee registers himself i.e. he provides all his details such as his ID, name ,department ,room

    number ,college name ,contact number, address etc. then the fingerprint is chosen from the database of images from fingerprint scanner and loaded into the employee database.

  4. ALGORITHM DESIGN FOR DATABASE MANAGEMENT SYSTEM

    This section describes the step by step instruction of the system developed for Database Management System used for the fingerprint images.

    Step 1 START

    Step 2 IF record present in database

    1. preview record as table or as detailed view

    2. or update record

    3. or Delete record

    4. or print record

    5. or preview employee fingerprint image in a maximized window

    6. or count record in database ELSE GOTO step 3

      Step 3 Register new employee

      1. Supply employees profile

      2. Load employees photograph

      3. IF med image is in binary, load it ELSE

      4. Convert med image to binary and load it

      5. Save record in database

        Start

        Preview Records

        Update Record

        Delete Records

        Count Records

        Register New Employee

        Employee Profile

        Save In Database

        Fig. 4 Fingerprint Database Management System

  5. CONCLUSION

In this paper we proposed the implementation of fingerprint database management system. Thus, the project to automate employee attendance is completed successfully in four modules using Matlab as front end, and MS access as backend, with the functional components of the project and the minimum requirements satisfied. Monitoring can be done easily with this system as any details about the employee is available easily.The project reduces the time consumption and the stress of attendance marking manually

REFERENCES

  1. Sunny Arief and Rudi Trisno, Adaptable Fingerprint Minutiae Extraction algorithm based on crossing number method for hardware implementation using FPGA, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Volume 2. Issue 3, June 2012.

  2. Sangram Bana and Dr. Davinder Kaur, Fingerprint recognition using image segmentation. International journal of advanced engineering sciences and technologies vol no. 5, issue no.1, 2011.

  3. Davide Maltoni, Dario Maio, Anil K. Jain & Salil Prabhakar, Handbook of Fingerprint Recognition, Springer, second edition, 2009.

  4. A. K. Jain, F. Patrick, A. Arun, Handbook of Biometrics, Springer science+Business Media, LLC, 1st edition, pp. 1-42, 2008.

  5. Maitane Barrenechea, Jon Altuna, and Miguel San Miguel, A Low Cost FPGA-Based Embedded Fingerprint Verication Embedded Fingerprint Verication and Matching System, Fifth Workshop on Intelligent Solutions in Embedded Systems (WISES 07), 2007.

  6. Sunny Arief and Rudi Trisno, Adaptable Fingerprint Minutiae Extraction algorithm based on crossing number method for hardware implementation using FPGA, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol. 2. Issue 3, June 2012.

  7. Sangram Bana and Dr. Davinder Kaur, Fingerprint recognition using image segmentation. International journal of advanced engineering sciences and technologies vol no. 5, issue no.1, 2011.

  8. Davide Maltoni, Dario Maio, Anil K. Jain & Salil Prabhakar, Handbook of Fingerprint Recognition, Springer, second edition, 2009.

  9. A. K. Jain, F. Patrick, A. Arun, Handbook of Biometrics, Springer science+Business Media, LLC, 1st edition, pp. 1-42, 2008.

  10. Maitane Barrenechea, Jon Altuna, and Miguel San Miguel, A Low Cost FPGA-Based Embedded Fingerprint Verication Embedded Fingerprint Verication and Matching System, Fifth Workshop on Intelligent Solutions in Embedded Systems (WISES 07), 2007.

  11. Tsai-Yang Jea, Minutiae-Based Partial Fingerprint Recognition, Ph.D. thesis, 2005, State University of New York at Buffalo.

  12. Salil Prabhakar, Fingerprint Classication and Matching Using a Filter bank, Ph.D. thesis, (2001), Department of Computer Science and Engineering, Michigan State University.

  13. Lin Hong, Automatic Personal Identification Using Fingerprints, Ph.D. Thesis, 1998.

  14. .Ajala Funmilola A*, Opasola Tomilola R, Falohun Adeleye S, Fenwa Olusayo D. Database Management System for a Digitized Medical Image,Journal of Biology, Agriculture and Healthcare ISSN 2224-3208 (Paper) ISSN 2225- 093X (Online)Vol 2, No.3, 2012

  15. http://en.wikipedia.org/wiki/Fingerprint_recognition.

  16. http://en.wikipedia.org/wiki/Biometrics.

  17. http://en.wikipedia.org/wiki/Database_toolbox

Leave a Reply

Your email address will not be published. Required fields are marked *