Você está na página 1de 24

Title: STUDENTS ATTENDANCE SYSTEM USING FINGERPRINT TECHNOLOGY

by FARAHANUM BT MASRUNI (2004219959)

FACULTY OF INFORMATION TECNOLOGY AND QUANTITATIVE SCIENCES

BACHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING

Approved by the examining committee:

.. ( En. Syamsul Ariffin b Yahaya ) Project Supervisor

.. ( En. Farok b Azmat ) Project Examiner

MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM MAY 2006

CERTIFICATION OF ORIGINALITY

This is to certify that I responsible for the work submitted in this project that the original work is my own except as specified in the reference and acknowledgement and that the original work contain here in have not been taken or done by unspecified sources or persons.

.. Farahanum bt Masruni 2004219959

ii COPYRIGHT UiTM

ACKNOWLEDGEMENT

Alhamdulillah, praise to Allah s.w.t, the most gracious and merciful for giving me the strength and wisdom in finishing this research. At last after a period of time, I have completed my final year project. For this golden opportunity, first and foremost, I would like to express my hearties gratitude to my supervisor, Encik Syamsul Ariffin b Yahaya, my examiner, Encik Farok b Azmat and my coordinator, Encik Adzhar b Abd Kadir for their understanding, and professional way s in assisting and giving their encouragement, guidance, comment and ideas that are useful towards in the development of my project paper.

Very special thanks also to my dearest family especially to my parent, for being supportive and pray for me. Moreover, I am so thankful especially to Amir b Othman for helping me to accomplish this project successfully.

To all my friends, thanks you very much. Lastly, to those who have been involve direct or indirectly.

iii COPYRIGHT UiTM

ABSTRACT

This project is about designing and developing a system, Students Attendance System (SAS) that will record the attendance of student in Fakulti Teknologi Maklumat & Sains Kuantitatif (FTMSK). SAS using fingerprint technology to authenticate every student by using their fingerprint in order to get an accurate record. The fingerprint technology is cheaper and easy to implement compared to other biometrics technology. The fingerprint only authenticates the validated student. SAS with the fingerprint features can make the system secure because no student can record their attendance except to be authenticated by the system. Besides provides security, this new system provides efficiency to both lecturers and students. SAS focused on the

developing system using SDLC as the methodology. This system using personal computer that is run under Windows 2000 platform and develop using apache, PHP and MySQL. This system uses the questionnaire method in order to analyze the user acceptance among respondents. In conclusion, this is important to provide the reliable and efficient record.

iv COPYRIGHT UiTM

TABLE OF CONTENTS
ACKNOWLEDGEMENT ............................................................................................... iii ABSTRACT ...................................................................................................................... iv TABLE OF CONTENTS ................................................................................................. v LIST OF FIGURES ........................................................................................................ vii LIST OF TABLES ........................................................................................................... ix LIST OF ABBREVIATIONS .......................................................................................... x CHAPTER 1 ...................................................................................................................... 1 INTRODUCTION............................................................................................................. 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 INTRODUCTION......................................................................................... 1 BACKGROUND ........................................................................................... 1 PROBLEM STATEMENT .......................................................................... 2 OBJECTIVES ............................................................................................... 3 PROJECT SCOPE........................................................................................ 4 PROJECT SIGNIFICANCE ....................................................................... 5 CONCLUSION ..................................................................................................... 5

CHAPTER 2 ...................................................................................................................... 6 LITERATURE REVIEW ................................................................................................ 6 2.1 2.2 2.2.1 2.2.2 2.2.3 2.2.4 2.2.5 2.2.6 2.2.7 2.2.8 2.2.9 INTRODUCTION......................................................................................... 6 BIOMETRIC TECHNOLOGIES ............................................................... 6 The history of Fingerprints .......................................................................... 6 Definition of Biometric ............................................................................... 11 Fingerprint Authentication ........................................................................ 13 Fingerprint Identification .......................................................................... 15 Fingerprint Verification ............................................................................. 16 Fingerprint Application.............................................................................. 17 Factors that cause fingerprint systems to fail........................................... 18 Summary of Biometric Methodologies...................................................... 18 Similar studies ............................................................................................. 21

v COPYRIGHT UiTM

2.3

CONCLUSION ................................................................................................... 22

CHAPTER 3 .................................................................................................................... 23 METHODOLOGY ......................................................................................................... 23 3.1 3.2 3.3 INTRODUCTION....................................................................................... 23 METHODOLOGY ..................................................................................... 23 CONCLUSION ................................................................................................... 29

CHAPTER 4 .................................................................................................................... 30 SYSTEM DEVELOPMENT .......................................................................................... 30 4.1 4.2 INTRODUCTION....................................................................................... 30 STUDENTS ATTENDANCE SYSTEM .......................................................... 30

CHAPTER 5 .................................................................................................................... 47 RESULT & FINDING .................................................................................................... 47 5.1 5.2 5.3 INTRODUCTION....................................................................................... 47 MANUAL SYSTEM ........................................................................................... 47 NEW SYSTEM.................................................................................................... 51

CHAPTER 6 .................................................................................................................... 57 CONCLUSION AND RECOMMENDATION ............................................................ 57 6.1 6.2 CONCLUSION ........................................................................................... 57 RECOMMENDATION .............................................................................. 58

REFERENCES ................................................................................................................ 59 APPENDIX A: ................................................................................................................. xii SAMPLE QUESTIONAIRRE ....................................................................................... xii APPENDIX B: ................................................................................................................ xvi SOURCE CODE ............................................................................................................ xvi

vi COPYRIGHT UiTM

LIST OF FIGURES
Figure 2.1: Minutiae examples Figure 2.2: Fingerprint application Figure 2.3: Market share by technology, 2001

Figure 3.1: Fingerprint Device Figure 3.2: MySQL Figure 3.3: Apache Figure 3.4: Database Configuration Figure 3.5: Database

Figure 4.1 (a): Main Page Figure 4.1 (b): Main Page Figure 4.2 (a): Form Login Figure 4.2 (a): Form Login Figure 4.3 (a): Form Students for students detail registration Figure 4.3 (b): Form Students for students detail registration Figure 4.4: Form Students for courses registration Figure 4.5 (a): Form Courses for listing all courses in each programme Figure 4.5 (b): Form Courses for list of courses Figure 4.6 (a): Form Searching Figure 4.6 (b): Form Searching Figure 4.7: Form Edit Student Figure 4.8 (a): Form Edit Course Figure 4.8 (b): Form Add Course Figure 4.8 (c): Form Add Course Figure 4.9 (a): Form Delete Course Figure 4.9 (b): Form Delete Course

vii COPYRIGHT UiTM

Figure 4.10 (a): Form Authentication for Lecturers Figure 4.10 (b): Form Authentication for Lecturers Figure 4.10 (c): Form Authentication for Lecturers Figure 4.11 (a): Form Authentication for Students Figure 4.11 (b): Form Authentication for Students Figure 4.12 (a): Form Authentication for Students Figure 12 (b): Form Authentication for Students Figure 4.13 (a): Form Report Figure 4.13 (b): Form Report Figure 4.13 (c): Form Report

Figure 5.1: Frequency of use the manual system Figure 5.2: Frequency of faced any problem with manual system Figure 5.3: Frequency of the reliability of the manual system Figure 5.4: Frequency of students satisfaction with the manual system Figure 5.5: Reinforcement of New Technology Figure 5.6: Frequency of easy to use of the new system Figure 5.7: Frequency of faced any problem with new system Figure 5.8: Frequency of the reliability & efficiency of the new system Figure 5.9: Frequency of students satisfaction with the new system Figure 5.10: Suggestion for proposing the new system

viii COPYRIGHT UiTM

LIST OF TABLES
Table 2.1: The history of Fingerprints Table 2.2: Pros and cons between Biometrics Technology

Table 5.1: Frequency of use the manual system Table 5.2: Frequency of faced any problem with manual system Table 5.3: Frequency of the reliability of the manual system Table 5.4: Frequency of students satisfaction with the manual system Table 5.5: Reinforcement of New Technology Table 5.6: Frequency of easy to use of the new system Table 5.7: Frequency of faced any problem with new system Table 5.8: Frequency of the reliability & efficiency of the new system Table 5.9: Frequency of students satisfaction with the new system Table 5.10: Suggestion for proposing the new system

ix COPYRIGHT UiTM

LIST OF ABBREVIATIONS

SAS Students Attendance System FTMSK Fakulti Teknologi Maklumat & Sains Kuantitatif UITM Universiti Teknologi Mara PHP Hypertext Preprocessor

FBI Federal Bureau of Investigation FAR False Accept Rate FRR False Reject Rate

x COPYRIGHT UiTM

CHAPTER 1

INTRODUCTION

1.1

INTRODUCTION

This chapter will focus on background of this project, problem of the manual system, the objectives, scope and significance of the project.

1.2

BACKGROUND

Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics. It includes fingerprint, iris, facial and retinal. Biometrics technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. Today, biometric is being spotlighted as the authentication method because of the need for reliable security.

Fingerprint authentication has been in use for the longest time and bears more advantages than other biometrics. It has been verified through various applications. In 1924, Federal Bureau of Investigation (FBI) is already known to have maintained more than 250 million civil files of fingerprints for the purpose of criminal investigation and the identification of unknown casualties. It now is being used in numerous field including financial, medical, e-commerce and customer application as a secure and effective authentication method.

COPYRIGHT UiTM

1.3

PROBLEM STATEMENT

Traditionally, students attendance is taken manually by using attendance sheet given by lecturer in class and not a system. With this manual system, there are some cases that student can cheat by asking their friends to tick or sign for them. This occurs because the students just want to fulfill the 80% of the attendance so that they can seat for the final examination at the end of the semester. Lecturer cant monitor for all students in the class and it is difficult for lecturer to record the attendance of students accurately and efficiently. Lecturers are responsible to monitor all the students attendance for the whole semester. For those students that fail to meet the 80% of their attendance rate will be given a reminder as a warning from faculty.

Because of this problem, a system may be needed in order to records the attendance of the students more accurately without have to trace manually by lecturers. A fingerprint device will be provided at each class and laboratory at the faculty. This system will record the attendance of students in class when the class begins and at the end of class. This is to ensure that the students have attended the class until the lecture ended by the lecturer.

2 COPYRIGHT UiTM

1.4

OBJECTIVES

The objective is important to achieve the goal. The main objectives of this project are:

1.4.1

To develop the Students Attendance System (SAS) using Fingerprint Technology.

The first objective is to develop the Students Attendance System. This system will integrate with the fingerprint technology. This system will record the attendance of the students in class. This system also will provide the facilities to the faculty to access the information of the students easily.

1.4.2

To compare efficiency between the proposed system and the manual system.

The second objective is to compare the manual system with the proposed system. This is important to ensure that the proposed system will provide more efficiency than the manual system.

3 COPYRIGHT UiTM

1.5

PROJECT SCOPE

The scopes of this project are:

1.5.1

System This system is Students Attendance System (SAS) that only records the attendance of the students in class.

1.5.2

Research area The implementation will be in Faculti Teknologi Maklumat & Sains Kuantitatif, Universiti Teknologi Mara (UiTM) Shah Alam campus.

1.5.3

Respondents The respondents will be the students at FTMSK itself.

1.5.4

Technology The hardware that will be used for this project is fingerprint device.

4 COPYRIGHT UiTM

1.6

PROJECT SIGNIFICANCE

The significance must be considered in every proposed system to ensure that the proposed system will provide more benefit to all parties especially the faculty. For this project, the significance has been identified. The significance can be categories into 3 groups. There are:

1.6.1

Faculty This significance of this system is mainly focusing for the FTMSK itself. This is because this project will enhance the efficiency of the manual system. It also can reduce in term of paper usage and avoid human error. All activities are done by computer and technology.

1.6.2

Lecturers With this system, lecturer can record the attendance of their students in class easily. They also do not have to count the percentage of every student at the end of the semester.

1.6.3

Students As a user, students can motivate themselves to be more discipline and punctual.

1.7

CONCLUSION

In this chapter, it is discuss several important sections that related to the project. All these sections will be a guideline to complete the project successfully. It includes the explanations about background, problem statement, scope, objectives and significant of the project.

5 COPYRIGHT UiTM

CHAPTER 2

LITERATURE REVIEW

2.1

INTRODUCTION

This chapter will focus on the literature review. It will introduce the history of the technologies, the definition, the identification and verification, the fingerprint application, summary of biometric methodologies and also factors that cause the fingerprint systems to fail and explained the similar study before.

2.2

BIOMETRIC TECHNOLOGIES

2.2.1

The history of Fingerprints

Moore, G, 2005 stated that the picture writing of a hand ridge patterns was discovered in Nova Scotia. In ancient Babylon, fingerprints were used on clay tablets for business transaction and in ancient China, thumbs prints were found on clay seals. In 14th century Persia, various official government papers had fingerprints and one government official, a doctor, observed that no two fingerprints were exactly alike.

Year 1686 Malpighi

Descriptions - In 1686, Marcello Malpighi, a professor of anatomy at the University of Bologna, noted in his treatise; ridges, spirals

6 COPYRIGHT UiTM

and loops in fingerprints. He made no mention of their value as a tool for individual identification. A layer of skin was named after him; "Malpighi" layer, which is approximately 1.8mm thick. 1823 - Purkinji In 1823, John Evangelist Purkinji, a professor of anatomy at the University of Breslau, published his thesis discussing 9 fingerprint patterns, but he too made no mention of the value of fingerprints for personal identification. 1856 - Hershel The English first began using fingerprints in July of 1858, when Sir William Herschel, Chief Magistrate of the Hooghly district in Jungipoor, India, first used fingerprints on native contracts. Sir Herschel's private conviction that all fingerprints were unique to the individual, as well as permanent throughout that individual's life, inspired him to expand their use. 1880 - Faulds During the 1870's, Dr. Henry Faulds, the British SurgeonSuperintendent of Tsukiji Hospital in Tokyo, Japan, took up the study of "skin-furrows" after noticing finger marks on specimens of "prehistoric" pottery. In 1880, Dr. Faulds published an article in the Scientific Journal, "Nature" (nature). He discussed fingerprints as a means of personal identification, and the use of printers ink as a method for obtaining such fingerprints. 1882 Thompson - In 1882, Gilbert Thompson of the U.S. Geological Survey in New Mexico used his own fingerprints on a document to prevent forgery. This is the first known use of fingerprints in the United States. 1888 - Galton Sir Francis Galton, a British anthropologist and a cousin of Charles Darwin, began his observations of fingerprints as a

7 COPYRIGHT UiTM

means of identification in the 1880's. 1891 Vucetich - Juan Vucetich, an Argentine Police Official, began the first fingerprint files based on Galton pattern types. At first, Vucetich included the Bertillon System with the files.

1892 Vucetich Galton

Juan Vucetich made the first criminal fingerprint & identification in 1892. Sir Francis Galton published his book, "Fingerprints", establishing the individuality and permanence of fingerprints. The book included the first classification system for fingerprints. While he soon discovered that fingerprints offered no firm clues to an individual's intelligence or genetic history, he was able to scientifically prove what Herschel and Faulds already suspected: that fingerprints do not change over the course of an individual's lifetime, and that no two fingerprints are exactly the same. According to his calculations, the odds of two individual fingerprints being the same were 1 in 64 billion. Galton identified the characteristics by which fingerprints can be identified. These same characteristics (minutia) are basically still in use today, and are often referred to as Galton's Details.

1897 Haque On 12th June 1987, the Council of the Governor General of & Bose India approved a committee report that fingerprints should be used for classification of criminal records. Later that year, the Calcutta (now Kolkata) Anthropometric Bureau became the world's first Fingerprint Bureau. Working in the Calcutta Anthropometric Bureau (before it became the Fingerprint Bureau) were Azizul Haque and Hem Chandra Bose. Haque and Bose are the two Indian fingerprint

8 COPYRIGHT UiTM

experts credited with primary development of the Henry System of fingerprint classification (named for their supervisor, Edward Richard Henry). The Henry

classification system is still used in all English-speaking countries. 1901 - Henry Introduction of fingerprints for criminal identification in England and Wales, using Galton's observations and revised by Sir Edward Richard Henry. 1902 First systematic use of fingerprints in the U.S. by the New York Civil Service Commission for testing. Dr. Henry P. DeForrest pioneers U.S. fingerprinting. 1903 The New York State Prison system began the first systematic use of fingerprints in U.S. for criminals. 1904 The use of fingerprints began in Leavenworth Federal Penitentiary in Kansas, and the St. Louis Police Department. They were assisted by a Sergeant from Scotland Yard who had been on duty at the St. Louis World's Fair Exposition guarding the British Display. Sometime after the St. Louis World's Fair, the International Association of Chiefs of Police (IACP) created America's first national fingerprint repository, called the National Bureau of Criminal Identification. 1905 U.S. Army begins using fingerprints. U.S. Department of Justice forms the Bureau of Criminal Identification in Washington, DC to provide a centralized reference collection of fingerprint cards.

Two years later the U.S. Navy started, and was joined the next year by the Marine Corp. During the next 25 years more and more law enforcement agencies join in the use of

9 COPYRIGHT UiTM

fingerprints as a means of personal identification. Many of these agencies began sending copies of their fingerprint cards to the National Bureau of Criminal Identification, which was established by the International Association of Police Chiefs. 1907 U.S. Navy begins using fingerprints. U.S. Department of Justice's Bureau of Criminal Identification moves to Leavenworth Federal Penitentiary where it is staffed at least partially by inmates. 1908 1918 U.S. Marin Corps begins using fingerprints. Edmond Locard wrote that if 12 points (Galton's Details) were the same between two fingerprints, it would suffice as a positive identification. Locard's 12 points seems to have been based on an unscientific "improvement" over the eleven anthropometric measurements (arm length, height, etc.) used to "identify" criminals before the adoption of fingerprints.

1924

In 1924, an act of congress established the Identification Division of the FBI. The IACP's National Bureau of Criminal Identification and the US Justice Department's Bureau of Criminal Identification consolidated to form the nucleus of the FBI fingerprint files.

1946

By 1946, the FBI had processed 100 million fingerprint cards in manually maintained files and by 1971, 200 million cards. With the introduction of AFIS technology, the files were split into computerized criminal files and manually maintained civil files.

2005

The FBIs Integrated AFIS (IAFIS) in Clarksburg, WV has

10 COPYRIGHT UiTM

more than 49 million individual computerized fingerprint records for known criminals. Old paper fingerprint cards for the civil files are still manually maintained in a warehouse facility (rented shopping center space) in Fairmont, WV, though most enlisted military service member fingerprint cards received after 1990, and all military-related fingerprint cards received after 19 May 2000, have now been computerized and can be searched internally by the FBI. In some future build of IAFIS, the FBI may make such civil file AFIS searches available to other federal crime laboratories. All US states and larger cities have their own AFIS databases, each with a subset of fingerprint records that is not stored in any other database. Thus, law enforcement fingerprint interface standards are very important to enable sharing records and mutual searches for identifying criminals.

Table 2.1: The history of Fingerprints

Source: Moore, G, 2005

2.2.2

Definition of Biometric

According to Bowman, E, 2000, biometric technologies are defined as automated methods of identifying or authenticating the identity of a living person based on a physiological or behavioral characteristic. Automated methods can be broken down into a mechanism used to scan, a processing or comparison unit and an interface with a variety of application systems. Identification refers to when characteristics are selected from a group of stored images; this produces a list of possible or likely matches.

11 COPYRIGHT UiTM

Authentication refers to the when an individual makes a claim that he or she is someone specific and just that one persons characteristics are being checked to see if they match. Bowman, E, also stated that physiological characteristic is a physical that does not change frequently such as fingerprint, hand silhouette, iris pattern or blood vessel pattern on the back of the eye. Behavioral characteristics are more of a reflection on physiological patterns such as signature, keystroke analysis and speech patterns.

Biometric recognition or simply biometric refers to the automatics recognition individuals based on their physiological and/or behavioral characteristics (Jain, A, 2004). For example fingerprint, iris, voice. He also stated that biometrics can allows people to confirm or establish an individuals identity based on who is she, rather than by what to possess (e.g, an ID card) or what she remember (e.g, a password).

A biometric can be described as a measurable physical and/or behavioral trait that can be captured and used to verify the identity of a person by computing the metric to a previously stored template. (Erikson, M, 2001). Biometric can be defined as the task of automatically recognizing a person using his/her distinguishing traits. The distinguishing traits refers to fingerprints, voice pattern, facial characteristics etc.

12 COPYRIGHT UiTM

2.2.3

Fingerprint Authentication

According to Prabhakar, Salil and Jain, Anil (n.d), fingerprint-based identification is the oldest method which has been successfully used in numerous applications. A fingerprint is made of a series of ridges and furrows on the surface of the finger. The pattern of ridges and furrows as well as the minutiae points can determine the uniqueness of a fingerprint. Minutiae points are local ridge characteristics that occur at either a ridge bifurcation or a ridge ending.

Fingerprinting is the oldest method of successfully matching an identity. A persons fingerprints are a complex combination of patterns known as lines, arches, loops and whorls (Biometric Technology, Inc, 2002). The most distinctive characteristics are the minutiae, the smallest details found in the ridge endings. Fingerprints cannot be forged and every individual has a unique print. Fingerprints have some advantages such as the prints remain the same throughout a persons lifetime, the fingerprinting is neither frightening nor emotionally disturbing and peoples prints are unique. Fingerprints also have some disadvantages. There are searching through a huge database can be rather slow, dirt on the finger or injury can blur the print, a fingerprint template is rather large compared to other biometric devices.

Fingerprints were one of the first biometrics to be adopted and have become synonymous with reliable personal identification. Among other biometrics technology, fingerprint has several advantages such as its universality, high distinctiveness and high performance. In universality, large majority of the human population has legible fingerprints and can easily be authenticated. Because of its high distinctiveness, twins who share the same DNA have been shown to have different fingerprint since the ridge structure

13 COPYRIGHT UiTM

on the finger is not encoded in the genes of an individual. Thus, fingerprints represent a stronger authentication mechanism than DNA. Fingerprints also remain the as one of the most accurate biometric modalities available to date with jointly optimal FAR (false accept rate) and FRR (false reject rate).

Erikson, M, 2001, most fingerprint verifications systems use minutiae matching point. Minutiae points are the points in a fingerprint image where the fingerprint ridges either or split up into two new ridges. Other than using the minutiae matching point, image matching and ridge-pattern matching method also can be used in verifications systems. According to some manufacturers, image matching is more secure than the minutiae matching but it is not the general opinion. According to other expertise, minutiae point matching is the fastest, simplest and most robust method available.

Figure 2.1: Minutiae examples

Source: H. Chang, D, 1999

14 COPYRIGHT UiTM

Você também pode gostar