DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my — for his financial support and moral care towards me.Also to my mentor — for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.
ACKNOWLEDGEMENT
The successful completion of this project work could not have been a reality without the encouragement of my — and other people. My immensely appreciation goes to my humble and able supervisor Mr. — for his kindness in supervising this project. My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. —, and Dr. —. I also recognize the support of some of the staff of — among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. — and the —. Finally, my appreciation goes to my elder sister —, my lovely friends mercy —, —, — and many others who were quite helpful.
CHAPTER ONE
- INTRODUCTION
Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Biometric-based solutions are able to provide for confidential financial transactions and personal
data privacy. The various features used are face, fingerprints, hand geometry, handwriting, iris, retina, vein and voice (Sahidullah et al., 2015). Fingerprinting or finger-scanning technologies are the oldest of the biometric sciences and utilize
distinctive features of the fingerprint to identify or verify the identity of individuals. Finger-scan technology is the most commonly deployed biometric technology, used in a broad range of physical access and logical access applications. All fingerprints have unique characteristics and patterns. A normal fingerprint pattern is made up of lines and spaces. These lines are called ridges while the spaces between the ridges are called valleys.
It is through the pattern of these ridges and valleys that a unique fingerprint is matched for verification and authorization. These unique fingerprint traits are termed “minutiae” and comparisons are made based on these
traits (Jain et al., 2010). On average, a typical live scan produces 40 “minutiae”. The Federal Bureau of Investigation (FBI) has reported that no more than 8 common minutiae can be shared by two individuals.
There are five stages involved in finger-scan verification and identification. Fingerprint (FP) image acquisition, image processing, and location of distinctive characteristics, template creation and template matching (Jain et al, 2018). A scanner takes a mathematical snapshot of a user’s unique biological traits. This snapshot is saved in a fingerprint database as a minutiae file. The first challenge facing a finger-scanning system is to acquire high-quality image of a fingerprint. The standard for forensic-quality finger printing is images of 500 dots per inch (DPI). Image acquisition can be a major challenge for finger-scan developers, since the quality of print differs from person to person and from finger to finger. Some populations are more likely than others to have faint or difficult-to-acquire fingerprints, whether due to wear or tear or physiological traits. Taking an image in the cold weather also can have an effect. Oils in the finger help produce a better print. In cold weather, these oils naturally dry up. Pressing harder on the platen (the surface on which the finger is placed, also known as a scanner) can help in this case. Image processing is the process of converting the finger image into a usable format. This results in a series of thick black ridges (the raised part of the fingerprint) contrasted to white valleys. At this stage, image features are detected and enhanced for verification against the stored minutia file. Image enhancement is used to reduce any distortion of the fingerprint caused by dirt, cuts, scars, sweat and dry skin (Jain et al, 2018). The next stage in the fingerprint process is to locate distinctive characteristics. There is a good deal of information on the average fingerprint and this information tends to remain stable throughout one’s life. Fingerprint ridges and valleys form distinctive patterns, such as swirls, loops, and arches. Most fingerprints have a core, a central point around which swirls, loops, or arches are curved. These ridges and valleys are characterized by irregularities known as minutiae, the distinctive feature upon which finger-scanning technologies are based. Many types of minutiae exits, a common one being ridge endings and bifurcation, which is the point at which one ridge divides into two.
A typical finger-scan may produce between 15 and 20 minutes. A template is then created. This is accomplished by mapping minutiae and filtering out distortions and false minutiae. For example, anomalies
caused by scars, sweat, or dirt can appear as minutiae. False minutiae must be filtered out before a template is created and is supported differently with vendor specific proprietary algorithms. The tricky part is comparing an
enrollment template to a verification template. Positions of a minutia point may change by a few pixels, some minutiae will differ from the enrollment template, and false minutiae may be seen as real. Many finger-scan
systems use a smaller portion of the scanned image for matching purposes. One benefit of reducing the comparison area is that there is less chance of false minutiae information, which would confuse the matching
process and create errors.
1.2 PROBLEM STATEMENT
The traditional system is still mostly used in lecture room or laboratory session in most institution today. Lecturer or instructor will give out a sheet of paper containing list of student’s name to sign or in some cases, the student will be the ones to write their names, student id and matriculation number to indicate their presence for a particular class. Falsification in student attendance does occur rampantly in the traditional method. For example, another student can easily sign an attendance on behalf of another student. In other to prevent this problem, it is necessary to develop an Authentication System for Students using fingerprint Biometric recognition that will be employed to track and keep the attendance of every student in a particular class. Fingerprint is unique feature for everyone compare to using barcode in smart cards. Therefore, this system designed in this project work is not based on the existing barcode system. Tracking and monitoring student time of attendance could be tedious, time consuming and more susceptible to errors. The security of the existing attendance system that are now use in classroom (signature system) can be easily compromised. Some students can master other student’s signature. Thereby, helping their colleague who are absent for a particular class to sign the attendance sheet using the duplicated signature. The Fingerprint recognition system designed in this research work for student is a more secure platform where students mark their attendance with their fingerprint.
1.3 AIM AND OBJECTIVES
The aim of this project work is to simulate an embedded fingerprint recognition system, which is used for access security applications. The specific objectives include:
- To provide a platform that will allow access using finger print.
- To provide a platform that will allow users to store data in a centralized database.
III. To design a new system that will increase security
1.4 SCOPE OF THE STUDY
The scope of this work covers implementing a security system using the finger print. There is a centralized database to take care of student personal and biometric data. The system is designed to query the database by inputting a user finger print and if it matches with the one in a system it will generate a 4-digit number that will enable the user to continue with his transactions.
1.5 SIGNIFICANCE OF THE PROJECT
Fingerprint recognition system when used in student attendance management system will eliminate the use of paper in manual signing processes and all the risk associated with it. One of the risks of using a paper in class attendance is that it can be easily misplaced and students cheat by signing for each other not present in the class thereby defeating the aim of taking the attendance. Tracking and monitoring students time of attendance could be tedious, time consuming and susceptible to error. Thus, the System will drastically reduce time needed to verify attendance data.
The System also allows the institution management to track or investigate student class attendance in a particular course having poor attendance thereby enabling the management to rectify the situation by providing the necessary interventions. The system provide high level of security whereby making it impossible for imposters and impersonators in making their ways to examination halls. The System using fingerprint Biometric will keep historical data making it easy for lecturers to access and grade students.
Fingerprint recognition system is extremely useful in institutions especially during classes, tutorials, laboratory sessions and examination during which heavy security are normally deploy to validate student’s identity in order to cob imposters, with the use of authentication System the number of security personnel will be greatly reduce. Most lecturers’ handout sheet of paper for their class attendance, which can easily be misplaced or damaged and poses a lot of stress in accumulating grades for their students. The system allows the lecturer to monitor each student attendance, track down truants and take the appropriate action. Thus, the system eliminates all these downsides. The Authentication system is not only useful to the institutions and lecturers alone, even the students benefit a great deal by reducing the stress in queuing up which result in delay and often time in the damage of the attendance sheet. It also prevents mistakes and anomaly that is associated with manual signing in which student that attend a class are marked as not present thereby losing the mark accorded to the particular attendance due to multiple attendance sheet.
- Students will be more regular in attending their classes since now no password or no attendance sheet signature is required, so no friend or any other student can make an attendance on behalf of others as fingerprints are unique for every student.
- Teachers do not need to waste their time approximately 15min of 1hour for taking attendance of students.
- No need to maintain attendance sheet as the attendance are electronically stored in database.
- The system helps the faculty to easily find out defaulters.
- User may easily get attendance history of a particular student.
- It saves time, cost, efforts and institute resources.
1.6 LIMITATIONS OF THE STUDY
The efficiency of the scanner can be reduced due to the roughages in the captured images which are often caused by worn-out or cut or dirt’s found on fingerprint. Therefore, there is every possibility that enrolled users can be rejected by the system. Also the scanner or sensor cannot distinguish between a real and an artificial finger, therefore it is possible to fool the scanner. In addition, if an enrolled fingerprint is been duplicated or spoof, it is not possible to change fingerprint as in the case of password because user finger biometric.
1.7 DEFINITION OF TERMS
Fingerprint: A fingerprint is an impression left by the friction ridges of a human finger. Fingerprint records normally contain impressions from the pad on the last joint of fingers and thumbs. Human fingerprints are detailed, nearly unique, difficult to alter, and durable over the life of an individual, making them suitable as long-term markers of human identity.
Detection system: detection system is a device or software application that monitors a systems for malicious activity or policy violations.
Biometric System: biometric system is a system that allows the recognition of a certain characteristic of an individual using mathematical algorithms and biometric data.
PROJECT DESCRIPTION
Format = Microsoft word
Chapters = 1-5 chapters
Price: N3,000.
For more information contact us through any of the following means:
Mobile No: +2348146561114 or +2347015391124
Email address: engr4project@gmail.com
Whatsapp No: +2348146561114
Design And Implementation Of Fingerprint Recognition System. (n.d.). UniTopics. https://www.unitopics.com/project/material/design-and-implementation-of-fingerprint-recognition-system/
“Design And Implementation Of Fingerprint Recognition System.” UniTopics, https://www.unitopics.com/project/material/design-and-implementation-of-fingerprint-recognition-system/. Accessed 22 November 2024.
“Design And Implementation Of Fingerprint Recognition System.” UniTopics, Accessed November 22, 2024. https://www.unitopics.com/project/material/design-and-implementation-of-fingerprint-recognition-system/
Here’s a typical structure for Design And Implementation Of Fingerprint Recognition System research projects:
- The title page of Design And Implementation Of Fingerprint Recognition System should include the project title, your name, institution, and date.
- The abstract of Design And Implementation Of Fingerprint Recognition System should be a summary of around 150-250 words and should highlight the main objectives, methods, results, and conclusions.
- The introduction of Design And Implementation Of Fingerprint Recognition System should provide the background information, outline the research problem, and state the objectives and significance of the study.
- Review existing research related to Design And Implementation Of Fingerprint Recognition System, identifying gaps the study aims to fill.
- The methodology section of Design And Implementation Of Fingerprint Recognition System should describe the research design, data collection methods, and analytical techniques used.
- Present the findings of the Design And Implementation Of Fingerprint Recognition System research study using tables, charts, and graphs to illustrate key points.
- Interpret Design And Implementation Of Fingerprint Recognition System results, discussing their implications, limitations, and potential areas for future research.
- Summarize the main findings of the Design And Implementation Of Fingerprint Recognition System study and restate its significance.
- List all the sources you cited in Design And Implementation Of Fingerprint Recognition System project, following a specific citation style (e.g., APA, MLA, Chicago).