INTRODUCTION Biometric System O4
INTRODUCTION Biometric System O4
INTRODUCTION
When it comes to tracking employees and their attendance, biometric time and
attendance systems have gained popularity in the business world.
The biometric attendance system has been used for many years by companies that
are looking for ways to improve efficiency and reduce costs.
of biometric systems and how they have so many advantages that will prove
valuable to all companies in the future.
There is a lack of flexibility to identify the person in case of a cut or wound or when
fingerprints are smudged with dirt or grease. Fingerprint sensors are sensitive, which
works in their favor if the fingers are clean, but these sensors are inefficient for
industries like mining, construction, and manufacturing.
The workforce in these industries either wears safety gear like gloves or has dirt and
dust on their fingers. It makes it cumbersome for them to record their attendance.
Fingerprint attendance systems are entirely dependent on hardware and peripherals. It is often
expensive to scale these systems as you will need to install hardware at every location. There
is no alternative to investing in new hardware every time.
For companies that have a primarily distributed workforce, with employees working on
remote sites or massive production floors, disadvantages of biometric scanning become
evident.
Fingerprint attendance systems often store data about physical traits such as fingerprint and
palm veins in a local database. This information is linked with individual workers. It is
essential to keep the data protected at times. Companies enabling fingerprint attendance
systems have to deploy measures to prevent the data from being hacked or stolen.
Fingerprint attendance systems are not as accurate as facial recognition systems. Also,
workers utilize tools and heavy machinery leading to wearing fingerprints for label industries
such as mining. It makes it difficult for machines to recognize the fingerprints leading to
frustration.
applications:
Government applications:
Commercial applications:
A biometric attendance machine is a device which is used to verify the identity of a person.
The characteristics used to identify a person include fingerprints, voice patterns, iris, face
recognition, and hand measurements. These biometrics are unique for every individual and
the data in the biometric devices cannot be shared or hacked. It replaces the traditional
security method of entering passwords or codes.
1. To get rid of paper-based monitoring: Employees and school staffs are surrounded by lots
of paper which in the end overwhelms them. Biometric attendance system will help them
eliminate the use of paper-based attendance tracking and erroneous calculations.
2. Most Accurate tracking solution: Humans are prone to errors and errors in attendance can
be costly to companies. Biometric Machines eliminate the inaccuracies in tracking
attendance. It is impossible to forge or duplicate the attributes of these machines.
3. Saves time: Biometric Devices save the precious time of employers that are required to
manage the attendance manually. The total time of the employee will be calculated
automatically based on the clock-in and clock-out time. An employer can download the
attendance report of any employee and view
4. Better security: Biometric systems are the most secure systems. No data can be stolen
from the database of these systems. They also eliminate the chances of proxy attendance. No
one can enter the premises without accessing the biometric. Hence eliminating the possibility
of theft.
5. Saves Money: It is a one-time investment that caters the need of an organization for year
Analysis
Objectives
A software program or platform called an attendance management system for
students is made to track and keep track of students' attendance in educational
institutions including schools, colleges, and universities. Its main objective is to
automate and streamline the process of monitoring student attendance in order to
ensure accuracy and effectiveness for both students and staff is a digital platform
designed to efficiently record and monitor the attendance of students in educational
institutions. It automates the process of tracking student attendance, making it easier
for teachers, administrators, and parents to access real-time attendance information.
Its main objective is to automate and streamline the process of monitoring student
attendance in order to ensure accuracy and effectiveness for both students and staff.
Real-time Updates: The system gives administrators and teachers real-time updates
on student attendance, allowing them to monitor attendance patterns and spot
irregularities.
Absence Notifications: In the event of a student's absence, the system can automatically
send emails, SMS messages, or mobile app notifications to parents or guardians informing
them of their child's absence
Reporting and Analytics: The system creates various reports and analytics, such as
daily, weekly, or monthly attendance summaries, using the attendance data that is
kept in a database. These reports and analytics enable administrators and teachers to
analyse attendance patterns and make informed decisions
Integration with Timetables: Integrating the system with the school's timetable
management will make it simpler to keep track of attendance for each class or
subject.
Alerts and Reminders: The system might provide tools that allow teachers or
students to put up alerts or reminders for impending events, significant dates, or low
attendance rates.
Problem
False acceptance
When someone is mistakenly identified by the system as an authorized user when they
are not, it happens. This failure may arise for several reasons, such as bad biometric
data or insufficient security mechanisms in the system. Unauthorized access to secure
locations, information, and systems may result from a false acceptance failure.
False Rejection
This problem often arises when the system fails to identify a legitimate user and
refuses them access. This kind of failure can happen for several reasons, including bad
biometric data, changes in an individual's biometric data over time, or programming
faults in the system. False rejection failures may prevent authorized users from
accessing secure areas or systems, which may have a detrimental impact on
productivity.
False Acceptance in Facial Recognition Technology
The American Civil Liberties Union (ACLU) tested Amazon's facial recognition
software, Rekognition, in 2019 by comparing images of members of Congress to a
database of 25,000 publicly available arrest photos. The findings revealed that 28
members of Congress were mistakenly listed by the system as having been detained
for criminal activity. This incident showed that facial recognition technology could
have high false positive rates, which could result in innocent people being mistakenly
classified as criminals.
False Rejection in Facial Recognition Systems
The use of facial recognition technology in security, surveillance, and authentication
systems has grown in popularity in recent years. Yet, a variety of factors can
sometimes cause technology to malfunction. For example, a news report from 2020
said that the facial recognition system employed by the Detroit Police Department had
a high false rejection rate, resulting in innocent people being mistakenly labeled as
suspects. This failure emphasizes how crucial it is to verify facial recognition
algorithms for accuracy and make sure they are not prejudiced against particular
groups.
False Acceptance in Voice Recognition Systems
Numerous more applications, such as virtual assistants and banking systems, use
voice recognition technologies. Technology, however, is not perfect and occasionally
fails for a variety of reasons. For example, a news piece from 2017 detailed how a UK
bank was forced to halt its voice recognition technology after it was discovered that
the system could be tricked by a fraudster using a vocal recording of the account
holder. The system featured a high percentage of fraudulent acceptances, which
allowed someone else to access the account holder's money without authorization.
Solution
1. Dirty or liquid-covered fingers
Make sure your hands are spotless because fingerprint readers need
spotless surfaces to read the image you set on your fingertip to
unlock the device. Dry your hands after washing them, then test
your fingerprint to see if it's working.
In such situations, the majority of Android phones let users add up to five
additional fingerprints to unlock their phones.
4. A software flaw
Conclusion
The biometric system may find applications in attendance system, security
systems, and identification purposes and may find even more applications
in the time to come. The prevalent systems would be worked upon and
modified for error free secure system. The accuracy levels need to be
increased for efficient security system. Proper selection of technique has to
be considered according to the requirement. Scientific wok is being carried
out for future applications and progress in the biometrics.
Limitations
RateofErrorBiometricattendancemachineshavetwotypes
oferrors,FalseAcceptanceRate(FAR) and False
RejectionRate(FRR).FARishappenswhenthedeviceacce
ptsanunauthorizedperson,anfFRRcomesintothe
picturewhenauthorizedpersonisrejected.Theerrorrateis1
%thatmeansanorganizationwith20,000employee,
willgetanerrorattendanceofapprox200employees:Delay
Biometricattendancesdevicestakemoretimetomark
theattendanceandcausesalongqueueofworkersinthemorn
ingandintheevening.
Reference
https://www.engineersgarage.com/blogs/biometrics-
technology-and-its-scope-future
http://www.biometricsinstitute.org/pages/types-of-
biometrics.html
https://www.ieee.org/about/technologies/emerging/
biometric s.pdf
Research Area