Biometric Fingerprint Attendance
Biometric Fingerprint Attendance
Biometric Fingerprint Attendance
FOR POSITRON
TECHNOLOGIES
VISIT
WWW.POSITRONINDIA.COM
FOR ANY HELP ON THIS
PROJEC
Biometric Fingerprint Attendance Management System
A PROJECT REPORT ON
SUBMITTED TO
www.positronindia.com
ABSTRACT
While the move towards the digital era is being accelerated every hour,
biometrics technologies have begun to affect people’s daily life more
and more. Biometrics technologies verify identity through characteristics
such as fingerprints, faces, irises, retinal patterns, palm prints, voice,
hand-written signatures, and so on. These techniques, which use
physical data, are receiving attention as a personal authentication
method that is more convenient than conventional methods such as a
password or ID cards. Biometric personal authentication uses data
taken from measurements. Such data is unique to the individual and
remains so throughout one’s life.
This technology has been applied for controlling access to high-security
facilities, but it is now being widespread developed in information
systems such as network, e-commerce, and retail applications. In these
technologies, fingerprint becomes the most mature and popular
biometrics technology used in automatic personal identification. In the
beginning, fingerprint verifying used in the military affairs and in the
criminal identification. But now, this technology is also being used in
several other applications such as access control for high security
installations, credit card usage verification, and employee identification.
The reason for the popularity of fingerprint verifying is that fingerprints
satisfy uniqueness, stability, permanency and easily taking. Just for this,
a number of fingerprint verification approaches have been proposed
until now
This system is an application of the fingerprint verifying and serial port
communication techniques and it is mainly used for employee
identification. Through practices, this system is proved to be easy-to-
use and effectively. And this paper is organized as follows. Section 2
describes the technological requirements for this system design. Section
3 outlines the functions of this system briefly and describes the
hardware and software design of this system. Section 4 introduces
some key problems in the implement of this system and finally Section 5
contains conclusions and future research plan.
EXISTING SYSTEM
DATABASE
3.5. Implementation:-
Hardware equipment is placed at the door of Office room. Before
entering the room employees or members are identified through
fingerprint scanner. On identification of a employee his/her attendance is
marked.
Following sequence of steps summarize the process of marking the
attendance.
Step 1: Capture the student’s fingerprint sample and create a feature
set. A set of unique features created to match fingerprint is called
feature set.
Step 2: Retrieve the stored templates from the repository (database).
Step 3: Perform a one-to-n comparison between the fingerprint feature
set and the fingerprint templates stored in database, make a decision of
match or non-match.
Step 4: If match is found retrieve student’s information (Registration
number, Department, Subjects) from the database.
Step 5: Obtain the scheduled lecture from the database and mark
attendance if student is within the specified time i.e. within 30 minutes of
the lecture’s starting time (see rules for detail). If verification is not done or
there is some error in enrollment of fingerprint, system goes back to its
initial state without marking the attendance.
Conclusion:-