0% found this document useful (0 votes)
134 views

Smart Attendance System Using Raspberry Pi

This document describes a smart attendance system using a Raspberry Pi device. The system uses fingerprint authentication for marking student attendance in classes. It consists of a Raspberry Pi microcomputer and fingerprint reader module. The system works by enrolling teacher and student fingerprints into a database. When taking attendance, the teacher scans their fingerprint for authentication. Students then scan their fingerprints, which are sent to a server to update attendance records. An Android app allows students to check their attendance. The system provides a secure and automated way to take and track class attendance using biometric fingerprint authentication on an affordable Raspberry Pi device.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
134 views

Smart Attendance System Using Raspberry Pi

This document describes a smart attendance system using a Raspberry Pi device. The system uses fingerprint authentication for marking student attendance in classes. It consists of a Raspberry Pi microcomputer and fingerprint reader module. The system works by enrolling teacher and student fingerprints into a database. When taking attendance, the teacher scans their fingerprint for authentication. Students then scan their fingerprints, which are sent to a server to update attendance records. An Android app allows students to check their attendance. The system provides a secure and automated way to take and track class attendance using biometric fingerprint authentication on an affordable Raspberry Pi device.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Volume 6, Issue 7, July – 2021 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Smart Attendance System using Raspberry Pi


Paras Jain Indra Kishor
UG Student, Computer Science Department, Assistant Professor, Computer Science Department,
Arya Institute of Engineering & Technology, Jaipur, Arya Institute of Engineering & Technology, Jaipur,
Rajasthan, India Rajasthan, India

Manish Jain Rajat Singh Shekhawat


UG Student, Computer Science Department, UG Student, Computer Science Department,
Arya Institute of Engineering & Technology, Jaipur, Arya Institute of Engineering & Technology, Jaipur,
Rajasthan, India Rajasthan, India

Prashant Kumar Shubham Mishra


UG Student, Computer Science Department, UG Student, Computer Science Department,
Arya Institute of Engineering & Technology, Jaipur, Arya Institute of Engineering & Technology, Jaipur,
Rajasthan, India Rajasthan, India

Abstract:- Now days, Biometric attendance system is used 2.2 LITERATURE SURVEY
in many applications. This entire work is done on the In this way the designer is an engineer who focuses on
Linux based embedded computer called raspberry pi, in the Integrated Fingerprint Identification Service which is a
which database creation, fingerprint recognition and very popular of the popular police agencies. Their finger-
python programming is totally done on raspberry Pi. This drawn pattern is characterized by a group of ridgelines that
paper discusses on the standardized authentication model always flow uniformly, but run and cut at other points. the
which is capable of fetching and matching the fingerprint personality of the fingerprints is set by the characteristics of
from database. the indigenous spine and their relationships. Many
automation systems of the local fingerprint comparison unit
Keywords:- Fingerprint Authentication, Python, Raspberry are supported by trivia similarity Nowadays, fingerprint
Pi. recognition is one of the most advanced biometric technology
supported by fingerprint imaging. in this way they raise the
I. INTRODUCTION level of fingerprints. In the case of fingerprint recognition, an
important step affecting the accuracy of the system is the
The human body has a unique feature. This feature has same between the model and the fingerprint queries. This
led to the field of biometrics. Its use is secure in a variety of method supports individual personality and separates
fields with embedded controllers and computers. It is now biometric tool separation to transfer information obtained in
used in places such as airports, hospitals, schools, colleges, this way they mistreat fingerprint and the same algorithmic
corporate offices etc. rule and that they store information to show who is
approaching access using a web page created within the
The biometric system includes finger verification, facial native server.
recognition, palm appearance etc. All of these strategies work
for a different level of performance. III. SYSTEM OUTLINE

It is a very old method and yet it is used simply because 3.1. HARDWARE ARCHITECTURE
of its accuracy and simplicity. Everyone is born with a unique
pattern on the fingers and DNA and this feature is used to
identify two different people. Rasberry
pi
II. RELATED WORKS

2.1. DEVICE SUPPORT


I knew the essential features of every fingerprint
scanner and checked the compatibility of the entire device. Fig 1: Proposed System Block Diagram
R305 is finally being finalized for use.
This proposed system consists of raspberry pi and
fingerprint module.

IJISRT21JUL797 www.ijisrt.com 728


Volume 6, Issue 7, July – 2021 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
3.1.1 Raspberry Pi text-based user interface, typed command labels or text
This hardware can be a portable device that will be roaming.
touched or held, a type of disk or portable disk. code is often
thought of as a program or group of programs that dictate 3.1.4 POWER SUPPLY
what a pc should try and what to do and how to try to do it. Model uses 5 volt power supply and has a ability to
Below is a picture of the Raspberry Pi that describes the drive 2.5 amperes of current.
many components that make up the hardware.
3.2 SOFTWARE ARCHITECTURE
3.1.2 FINGERPRINT READER In this project the softwares used are like MySQL,
The R305 module supports both windows and the opencv (python script). The procedures for setting up, saving
Linux-based system. Scanning the fingers properly when the and retrieving fingerprint processes are described in future
user places a finger on it. chapters.

3.2.1 SOFTWARE- ALGORITHM


The software algorithm of authentication system is
described here,
i. Process Starts
ii. Select the option to enrol new fingerprint or delete
previous ones.
iii. If nothing is selected it scans for the wifi network and
joins if new known network.
iv. If none of the known network are present than it
displays all the available network.
v. Any of the new network can be selected and joined by
entering the password.
vi. Once the connection is established it starts scanning
for the fingerprints.
vii. When a teacher scans his/her fingerprint it asks for
the class and lecture for which attendance is being
taken.
viii. Now the students can scan their fingerprints.
ix. Whenever it recognises any student it send their
fingerprint ID to the server through packet data
It offers a high-quality and reliable fingerprint template transmission.
and a gingerbread computer. x. When a server receives the data from the system it
updates the attendance of the student.
The device can automatically control encryption, and xi. When the attendance of all the students is taken, any
data transfer through the USB interface. student can check his/her attendance on the android
application.

3.3 IMPLEMENTATION PROCEDURE

3.3.1 FPRINT DEMO: GRAPHICAL

DEMONSTRATION APPLICATION

Fig 3: Finger print module

This module is found to be very reliable in all intelligent


OS, even its easy to interact with raspberry pi.The R305
Module Associate degreed digital Persona Fingerprint
Recognition Engine has unparalleled ability to verify even the
most sensitive fingerprints accurately.

3.1.3 GUI (Graphical User Interface)


It is an interaction that allows the user to interact with Fig 4: Capturing of fingerprint template
the device. Visual cues such as duplicate typing, replacing the

IJISRT21JUL797 www.ijisrt.com 729


Volume 6, Issue 7, July – 2021 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
This edited program is forced into a UNIX-based Thus the above figure shows the mismatched
application based on the GUI application, the printer model characteristics of two different fingers, while comparing the
and the fingerprint model, with the intention of violating this same fingers I got the matching points almost every where in
to demonstrate the functionality of the fingerprint device next finger templates.
to the raspberry pi installed inside. fprint demo provides
Associate link for fingerprinting and deleting fingerprint V. CONCLUSIONS AND FUTURE WORK
registration information with the help of fprint GUI, degree
degree interface to ensure selected finger joints Recognition of fingerprints is one of the hallmarks of
Biometric style and technology. Nowadays, it is used in many
3.3.2 CONVERTING THE TEMPLATE IN TO real-time applications. However, recognizing fingerprints in
BINARAIZED TEMPLATE the UNIX operating system is primarily based on detecting
This graphical user interface is capable of changing the python mischief done entirely in raspberry pi This paper
fingerprint guide in to binary guide. The imaging discusses the standard fingerprint model used to compile the
performance of this device is superb. The came pictures fingerprint guide guide. with this model, if the pre-processing
square measure giant and realize an oversized variety of step, note the changes between the templates, control the
trivialities, resulting in appropriately distinct scores for parameters and combine fingerprints. Thereafter the
matching/non-matching fingers. Fig four shows a picture employment of matching fingerprints on fingerprints within
came by this driver and its binarized type with trivialities the information to determine the suitability of this model.
planned with the assistance of raspberry pi embedded laptop. Embedded computers (still in pi piano) ar remains a daunting
task. all of this work is completed in the UNIX operating
system primarily based on an embedded laptop called
raspberry pi, where data building and management,
fingerprint access, authentication and targeting must be done
to increase system accuracy and improve real-time high-
resolution cloud abuse application development. created
done. In the future this one device can be enforced, and used
by several educators.

VI. ANDROID
Fig 5: Normal and binarized template
Android can be portable software developed by Google,
IV. EXPREIMENTAL RESULTS supports the Linux kernel and is designed for bit screen
mobile devices such as smart phones and tablets. The request
After removing the fingerprint interface for fingerprint was made to check the code to go to the organization's usage
display, Afterwards the comparison is extracted with the help code.
of an open cv program tool with python text and generating
transit file details to transfer to the cloud. REFERENCES

The below figure shows the image of mismatched [1]. Sonam Shukla, Pradeep Mishra [2012],"Increasing The
fingers, which is identified by the python script which uses Accuracy Of An Existing Recognition System Using
the special image processing algorithm called Adaptive Technique" International Journal of Advanced
FLANN_INDEX_KDTREE with cv2.FlannBasedMatcher Research in Computer Science and Software
Fig 6 given below shows mismatched fingerprints of different Engineering, Volume 2, Issue 6, PP 52-57.
persons the python program is running as the background [2]. Le Hoang Thai and Ha Nhat Tam [2010]," Fingerprint
process. recognition using Standardized M fingerprint model"
IJCSI International Journal of Computer Science Issues,
Vol. 7, Issue 3, PP 1116.
[3]. Mukesh Kumar Thakur, Ravi Shankar Kumar, Mohit
Kumar, Raju Kumar [2013],"Wireless Fingerprint
Based Security System Using Zigbee Technology"
International Journal of Inventive Engineering and
Sciences (IJIES),ISSN:2319– 9598, Volume-1, Issue-5,
PP 14-17
[4]. Arun, Emmanuel., Diwakar& Rajeswari Automated
attendance system using biometrics with Embedded
web server‖ Graduate Research in Engineering and
Technology (GRET): An International Journal, page
Fig 6: mismatched finger ridges in template No-(54to57).

IJISRT21JUL797 www.ijisrt.com 730


Volume 6, Issue 7, July – 2021 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
[5]. Karthik Vignesh E, Shanmuganathan S, A.Sumithra
S.Kishore and P. Karthikeyan ―A Foolproof Biometric
Attendance Management System‖ International Journal
of Information and
ComputationTechnology.ISSN:0974-2239.
[6]. www.tutorialspoint.com
[7]. www.raspberry pi.org

IJISRT21JUL797 www.ijisrt.com 731

You might also like