Staff Attendance Monitoring System Using Fingerpri

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/323221513

Staff Attendance Monitoring System using Fingerprint Biometrics

Article  in  International Journal of Computer Applications · February 2018


DOI: 10.5120/ijca2018916370

CITATION READS

1 2,909

3 authors, including:

Mukaila Olagunju Emmanuel Adeniyi


Federal University Oye-Ekiti Landmark University
11 PUBLICATIONS   4 CITATIONS    19 PUBLICATIONS   6 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

QrCode Implementation on Student Identity Card for easy Verification View project

All content following this page was uploaded by Emmanuel Adeniyi on 04 June 2018.

The user has requested enhancement of the downloaded file.


International Journal of Computer Applications (0975 – 8887)
Volume 179 – No.21, February 2018

Staff Attendance Monitoring System using Fingerprint


Biometrics

M. Olagunju A. E. Adeniyi T. O. Oladele


Department of Computer Science, Department of Computer Science, Department of Computer Science,
Federal University Oye-Ekiti, Oye- Landmark University, Omu-Aran University of Ilorin, Ilorin,
Ekiti, NIGERIA NIGERIA NIGERIA

ABSTRACT After visiting some organizations, it was discovered that there


Staff Attendance System is a simple windows based is no proper system to monitor the Staff attendance. Some
attendance system that was specifically developed for small companies still use log book to keep track of the employees'
and medium scale companies. This software helps to manage attendance. These attendance records are not precise. Besides,
the workforce and track employee time and attendance in an the company still uses the paper-based system to keep track of
easier way. This software application can manage the the records of the staff. This method is not secure because the
recordings, control and monitoring of staff absence and records may be lost. It is also hard to find certain records
lateness. The significance of this application is to make sure using paper-based system. With the paper based system, the
that the staff member are punctual and do their jobs on time. employee can also manipulate the time of signing in and out.
Currently, there is no proper system to monitor the staff The paper based system also waste a lot of time in signing in
attendance at some companies. Some companies still use the and out. The most important thing in having the system is to
paper based system to store the records of the employees. maintain an accurate and precise time management to track
With the implementation of this system, paper based system the attendance of the employees.
will be eliminated. This research will help the Administrator The developed system can trace the attendance of the
to manage recordings, monitoring and tracking the attendance employees so as to know when they are coming and leaving
of the employees. It provides an accurate time management from work. Besides, the system is able to calculate the total
for the employees in order to sign in and sign out their working days of the employees, total of the employees who
attendance. In this paper, the biometrics based Staff work over time, total of the employees who are coming late
Attendance Monitoring System was developed using Visual and also able to generate reports regarding the attendance of
Basic Programming Language as front end while Microsoft the employees.
Access was used as the Database to the backend users.
With the report, the Administrator can easily analyze and
General Terms detect the performance of the employees in the company.
Security, Fingerprint recognition, Attendance management Besides, the system can keep track of the records about the
employees such as their personal details. The administrator
Keywords can view those records easily through this system without
Attendance, Staff, Monitoring System, Fingerprint, having to look into files manually. With the implementation
Biometrics of this system, the paper-based system will be eliminated.
This system can save time and minimize the manpower for
1. INTRODUCTION manual management. Besides, the employees' records are
“Time” they say is “Money”. There is perhaps no more more secured which are saved into the database. This system
accurate analogy in business. Unfortunately, if there is one also helps to reduce clerical cost such as papers, files and
thing we all have difficulty managing, it is time. This includes stationery.
the ability to accurately measure and manage the time and
attendance of staff [1]. Indeed, new research from Aberdeen Fingerprint may be deposited in natural secretions from the
group reveals that time and attendance monitoring systems are endocrine glands present in friction ridge skin (secretions
now the very cornerstone for laying a foundation of effective consisting primarily of water) or they may be made by ink or
workforce management systems. No wonder, then, that other contaminants transferred from the peaks of friction skin
growing number of companies are eager in upgrading and ridges to a relatively smooth surface such as a fingerprint card
adopting time and attendance systems. [5]. The term fingerprint normally refers to impressions
transferred from the pad on the last joint of fingers and
Clients and colleagues count on staff to be at work as thumbs, through fingerprint cards also typically record
scheduled to provide smooth and efficient operations [7]. portions of lower joint areas of the fingers. An individual’s
Although there are separate regulations governing different fingerprint is scanned to identify 10 to 26 unique points of the
categories of staff, regular and punctual attendance is an finger, and a unique number is assigned to it.
ongoing expectation for all staff, both classified and
professional The definition of the actual arrival time that Currently, there is no proper system to monitor the employees'
constitutes a tardy or late occurrence is at the discretion of the attendance at some companies. Besides, the company still
supervisor, with consideration given to the type of position uses the paper-based system to keep track of the records of the
(for example, receptionist), client needs, and other relevant employees. As a solution, the Fingerprint Biometrics Staff
information. Failure to maintain an acceptable attendance Attendance Monitoring system will be developed to overcome
record may result in an unsatisfactory performance evaluation the problems that are stated above and provide an effective
and/or disciplinary action up to and including dismissal[10]. way to monitor the employees' attendance. This system will

8
International Journal of Computer Applications (0975 – 8887)
Volume 179 – No.21, February 2018

provide a user-friendly interface to make the system easy to The Identix system uses a compact terminal that
use. incorporates light and Charged Couple Device (CCD) image
sensors to take high-resolution picture of a fingerprint. It
2. LITERATURE REVIEW is based on 68000 CPU with additional custom chips, but can
2.1 Biometrics also be configured as a peripheral for an IBM PC. It can
Biometrics refers to the automatic identification of a person operate as a standalone system or as part of a network [12].
based on his physiological/behavioural characteristics [2]. To enroll, a user is assigned a personal identification number
This method of identification is preferred for various reasons; and then puts a single finger on the glass or Plexiglas plate
the person to be identified is required to be physically present for scanning by a CCD image sensor. The 250-KB image
at the point of identification. Identification based on is digitalized and analyzed, and the result is approximately 1-
biometric techniques obviates the need to remember a KB mathematical characterization of the fingerprint. This
password or carry a token [13]. With the increased use of takes about 30 seconds. Identity verifications take less than 1
computers or vehicles of information technology, it is second. The equipment generally gives the user three attempts
necessary to restrict access to sensitive or personal data. By for acceptance or finds rejection. With the first attempt the
replacing Personal Identification Number, biometric false rejection is around 2-3 percent and false acceptance is
techniques can potentially prevent unauthorized access to less than 0.0001 per cent. Each standalone unit cab stores 48
fraudulent use of Automated Teller Machine, cellular phones, fingerprint templates which may be expanded to 846 by
smart cards, desktop PCs, workstations, and computer installing an additional memory package [11].
networks. Personal Identification Number and passwords may
be forgotten, and token based methods of identification like Fingerprints have overcome the stigma of their use in law
passports and driver’s licenses may be forged, stolen, or lost. enforcement and military applications. Finger print
Thus, biometric systems of identification are enjoying a recognition is appropriate for many applications and is
renewed interest. Various types of biometric systems are familiar idea to most people even if only from crime
being used for real–time identification; the most popular are dramas on television. It is non-intrusive, user friendly and
based on face recognition and fingerprint matching. relatively inexpensive.
However, there are other biometric systems that utilize iris
and retinal scan, speech, facial thermo grams, and hand 2.3 Benefits of Fingerprint
geometry. Today fingerprint devices are by far the most popular form of
biometric security in use, with a variety of systems on the
A biometric system is essentially a pattern recognition market intended for general and mass-market usage.
system, which makes a personal identification by determining
the authenticity of a specific physiological or behavioural Long gone are the huge bulky fingerprint scanners; now a
characteristics possessed by the user [14]. An important issue fingerprint-scanning device can be small enough to be
in designing a practical system is to determine how an incorporated into a laptop for security.
individual is identified. Depending on the context, a
biometric system can be either a verification (authentication) 2.4 Fact and Findings of Attendance System
system or an identification system. There are two different Staff attendance software system is a software used to manage
ways to resolve a person’s identity: Verification and or monitor the time worked by employees for the purpose of
Identification. Verification (Am I whom I claim I am?) efficiency and punctuality of the employees. These systems
involves confirming or denying a person’s claimed identity. In may be integrated with existing payroll processing software.
Identification one has to establish a person’s identity (who am Also, these systems track employee that come late to work
I?). Each one of these approaches has its own complexities and the ones that come early. These systems usually are able
and could probably be solved best by a certain biometric to give reports of all the staff records concerning signing in
system. and out.
The advantages of staff attendance monitoring system are: it
2.2 Fingerprint Scanner can reduce the time needed to enter 'hours worked' data into
Perhaps most of the work in biometric identification has gone payroll system and can reduce errors in enforcement of
into the fingerprint. For general security and computer company attendance policies[6].
access control application fingerprints are gaining popularity
[5]. The fingerprint’s stability and uniqueness is well Staff Attendance Monitoring System is an easy way to keep
established. Based upon a century of examination, it is track of any organization's attendance records. It also works
estimated that the change of two people, including twins, very well as a member database. The program was developed
having the same print is less than one a billion. In verifying with three main goals in mind: versatility, ease of use, and
a print, many devices on the market analyze the position of security.
details called minutiae such as the endpoi{nts and junctions of
Versatility:-Not every organization has the same attendance
print ridges. These devices assign locations to the minutiae
policies, so this program easily allows you to specify your
using x, y, and directional variables. Some devices also
organization's policies. You can also store any information
count the number of ridges between minutiae to form the
you would like about each member.
reference template. Several companies claim to be
developing templates of fewer than 100 bytes. Other Ease of Use:-This program is very intuitive. It was designed
machines approach the finger as an image processing so that all of the instructions that are needed are right on the
problem and applying custom very large scale integrated screen. The finger print scanner which will be installed beside
chips, neural networks, fuzzy logic and other technologies to the computer is where employees will place their thumb in
the matching problem [15]. order to capture their details.
The fingerprint recognition technology was developed for
some 12 years before being matched in 1983 by Identix Inc.

9
International Journal of Computer Applications (0975 – 8887)
Volume 179 – No.21, February 2018

Security:- A non-registered staff will not be allowed to sign 3.1 Minutiae Matching
in and out even though he place his/her thumb on the finger Let T and I be the representation of the template and input
print scanner for years. fingerprint, respectively. Each minutia is considered as a
3. MATERIALS AND METHOD triplet m  {x, y, } that indicates the x, y minutia location
Fingerprint identification system is mainly divided into three coordinates and the minutia angle θ:
modules; fingerprint image preprocessing, minutiae extraction
and minutiae matching [9]. The input fingerprint image is T  {m1, m2, m3........mm}, mi  {x1, y1, 1},
processed for skeleton image by the fingerprint image
preprocessing stage and subsequently processed by minutiae
i  1,2......m
extraction stage for extracting minutiae using crossing number
concept. After minutiae extraction stage, if input fingerprint I  {m'1, m'2, m'3........m' n}, m' j  {x' j, y' j, ' j},
image is processed for enrollment then the skeleton image is
saved as template fingerprint image in database, otherwise j  1,2......n
skeleton image is given to matching stage. In matching stage where m and n denote the number of minutiae in T and I,
system compares skeleton image with template fingerprint respectively. A minutia m′j in I and a minutia mi in T are
images from database and make decision whether input considered “matching”, if the spatial distance (sd) between
fingerprint match or not. them is smaller than a given tolerance r0 and the direction
difference (dd) between them is smaller than an angular
Minutiae matching and detection is employed in this research tolerance θ0 [8].
which is the most common method of extraction using the
Crossing Number (CN) concept. This method involves the use P4 P3 P2
of the skeleton image where the ridge flow pattern is eight-
connected. The minutiae are extracted by scanning the local P5 P P1
neighbourhood of each ridge pixel in the image using a 3×3
window. The CN value is then computed, which is defined as P6 P7 P8
half the sum of the differences between pairs of adjacent
pixels in the eight-neighbourhood [3]. The CN for a ridge
pixel P is given by Figure 1: this figure displays 3 by 3 windows for minutiae
searching
1 8
CN   | Pi  1 |,P9  P1.
2 i 1

where pi is the pixel value in the neighbourhood of P. For a


pixel P, its eight neighbouring pixels are scanned in an
anticlockwise direction as display in figure 1:
After Cross Number for a ridge pixel has been computed, the
pixel can then be classified according to the property of its
CN value. Using the properties of the CN as shown in Table
1, the ridge pixel can then be classified as a ridge ending,
Figure 2: Original Image
bifurcation or non-minutiae point. For example, a ridge pixel
with a CN of one corresponds to a ridge ending, and a CN of
three corresponds to a bifurcation.
Table 1: The table below shows the Properties of Crossing
Number. [4].
CN Property

0 Isolated Point

1 Ridge Ending Point

2 Continuing Ridge Point


Figure 3: Minutiae Extracted using Cross Number
3 Bifurcation Point concept

4 Crossing Point

10
International Journal of Computer Applications (0975 – 8887)
Volume 179 – No.21, February 2018

Input Fingerprint
Image

Normalization

Segmentation

Fingerprint Image
Fingerprint Image Preprocessing
Enhancement

Binarization

Enhanced Image

Thinking Minutiae
Extraction

Minutiae
Detection

Skeleton Image
Skeleton for
Identification
Enrollment or
Detection?

Skeleton Image for


Template fingerprint
enrollment image

Minutiae Matching
Template Database
Matching Decision

Figure 4: This figure display the Work Flow Diagram of Fingerprint Identification System.

11
International Journal of Computer Applications (0975 – 8887)
Volume 179 – No.21, February 2018

Start

Welcome Screen

Main Page

Staff Registration Sign In Sign Out

Stop

Figure 5: System flow chart of the proposed Fingerprint Attendance Monitoring System.

The flowchart comprises of three modules which are: The


Staff Registration Module for the Staff which is done by the
System Administrator, The Sign In Module and the Sign Out
Module mainly for the staff.

4. DISCUSSION OF RESULT

Figure 6: Home Page.

12
International Journal of Computer Applications (0975 – 8887)
Volume 179 – No.21, February 2018

Figure 6 display the homepage where Staff Place their Finger fingerprint scanner for sign in and as well place his/her finger
on the Scanning Machine. This module performs three on the fingerprint scanner for sign out on this main menu
activities, the Main Menu module, the sign In and as well the module.
Sign Out. A staff will be asked to place his/her finger on the

Figure 7: Staff Sign In Menu.


The popup interface is displayed after the staff might have Interface with the staff basic information and as well the date
place his/her finger on the fingerprint scanner is the Sign In and time the staff sign in as shown in figure 7.
.

Figure 8: Staff Registration Module.


Figure 8 displays the form where the staff will be registered staff will be taken as well as the passport and the fingerprint
by the system Administrator. The basic information of the before the registration can be successful.

13
International Journal of Computer Applications (0975 – 8887)
Volume 179 – No.21, February 2018

Figure 9: Staff Sign Out Module.


Figure 9 displays the basic information of a staff that has
successfully signed out by placing his/her finger on the
fingerprint scanner.

Figure 10: Staff Registration Database.


This figure displays the list of all registered staff, with their pictures displayed in jpg format and fingerprint template.
e.

Figure 11: Staff Attendance Sign-In Database.


This figure displays the list of signed in staff on daily basis. The list comprises of the date and time each staff signed in.

14
International Journal of Computer Applications (0975 – 8887)
Volume 179 – No.21, February 2018

Figure 12: Staff Attendance Sign out Database.


This figure displays the list of staff that signed out from office Verification”, Journal of Computing Technologies, vol.
on daily basis with the date and time each staff signed out 1, June 2012.
from the office. And once a staff signed out for the day he/she
cannot be able to sign-in for the day again. [5] James, M., Rehg and Takeo, K. (1993). DigitEyes:
Vision-Based Human Hand-Tracking. School of
5. CONCLUSION AND Computer Science Technical Report CMU- CS-93-220,
Carnegie Mellon University.
RECOMMENDATION
Having gone through the rudiments of the manual and [6] Jonah, A. (1995). Fingerprint in Management attendance,
automated biometrics based system; it can concluded that the Maxvin Pub. India.
need for a computer based attendance monitoring system
[7] Jones, J. (1999). Statistical color models with application
cannot be over emphasized. From the two systems discussed,
to skin detection. In Proceedings of IEEE Conference on
the manual system has a lot of draw backs and can be easily
Computer Vision and Pattern Recognition.
manipulated by the staff.
[8] Maltoni D., Maio D., Jain A. K., and Prabhakar S.
It is therefore concluded that the newly developed software is
“Handbook of Fingerprint Recognition”. Springer, 2003.
more effective and efficient in monitoring staff attendance. If
it is implemented, the entire draw backs of the manual system [9] Manvjeet Kaur, Mukvinder Singh and Parvinder S.
will be eliminated or drastically minimized. Sindhu, “Fingerprint Verification System using Minutiae
Extraction Technique”, Proceedings of World Academy
The future scope of this study can be implemented using
of Science, Engineering and Technology, vol. 36,
facial recognition attendance system.
December 2008.
Due to the benefits of the automated system for monitoring
[10] Sato, Y. Kobayashi, Y. and Koike, H. (1991). Fast
staff attendance that was developed in this study, the system is
tracking of hands and fingertips in infrared images for
hereby recommended to all private and government
augmented desk interface.
organizations in Nigeria in order to take proper records and
manage the staff activities in their organization. [11] Segen J. Segen, S. and Kumar, J. (1999). Shadow
gestures: 3D hand pose estimation using a single camera.
6. ACKNOWLEDGMENTS
Thanks to the experts who have contributed towards [12] Sheetal, V. and Chander, K. (2012). Biometric
development of the template. Recognition system: An introduction. Department of
computer science and applications k.U; Kurukshetra,
7. REFERENCES Haryana, India.
[1] Aberdeen, F. (2008). Time Management System in [13] Swanirbhar, M. and Saurabh, P. (2016). Biometrics:
Organization. Wesley Pub. London. Concepts, Methodologies, Tools and Application.
[2] Crowell, K. (2002). Importance of biometric Technology. Management Association, Information Resources. IGi
Carnegie Mellon University. Global Publisher. ppp 1852.

[3] Feng Zhao and Xiaoou Tang, “Preprocessing and [14] Trucco E. (1998). Introductory Techniques for 3D
postprocessing for skeleton-based fingerprint minutiae Computer Vision. Prentice-Hall, Vision and Pattern
extraction”, Pattern Recognition Society, Published by Recognition.
Elsevier Ltd, 2006. [15] Zhang, Z. Shan, Y. and Shafer, S. (2001). Visual panel:
[4] Ishpreet Singh Virk and Raman Maini, “Fingerprint Image Virtual mouse keyboard and 3rd controller with an
Enhancement and Minutiae Matching in Fingerprint ordinary piece of paper. In Proceedings of Perceptual
User Interfaces.

IJCATM : www.ijcaonline.org 15

View publication stats

You might also like