Sei sulla pagina 1di 3

Proceedings of the 20 1 1 IEEEIICME International Conference on Complex Medical Engineering May 22 - 25,Harbin,China

Biometric Attendance System


Engr. Imran Anwar Ujan and Dr. Imdad Ali Ismaili
Institute of Information & Communication Technology, University ofSindh, Jamshoro, Sindh, Pakistan Pakistan
Abstract - This research work has application for attendance system of employer's and students in general. The system will facilitate institutions! organization to make attendance individual in time along with data information thumb impression will be taken as a signature for the system entry. Main design and challenge in this system is the design of database architecture and its business logic.

junction. In this research, we will be dealing mainly with ridge endings and bifurcations. There literature are for various both types of approaches proposed and in image enhancement, minutiae

extraction from fingerprints. The literature on these techniques will be examined are reviewed in determining the best approach to develop for this research. In particular, the fingerprint image enhancement algorithm employed by Hong et al. will be evaluated and implemented to understand how the enhancement algorithm works and how well it performs. Once a reliable minutiae extraction technique has been implemented and tested, this can be used as the basis of statistical analysis of fingerprint minutiae. The work of Tu and Hartley and Pankanti et al. can be examined in which a statistical framework for analyzing system performance has been presented. Tu and Hartley defined a means of forming a binary code from set of fingerprint features and then performing a set of matching experiments on the database to estimate the number of degrees of freedom within the fingerprint popUlation.

I. AIMS AND OBJECTIVE The aim of this system is to implement in C#.net set of reliable techniques for fingerprint image enhancement and minutiae extraction. The performance of these techniques will be evaluated on a fingerprint data set. In combination with these development techniques, statistical experiments can then be performed on the fingerprint data set. The results from these experiments can be used to help us better The understand main aim what that is this involved system in determining test the statistical uniqueness of fingerprint minutiae. would whether attendance by fingerprint is enough for identification. It is expected that the work in this system will reach the stage of being able to fully test hypothesis. II.

Problem
There are some problems which face by fingerprint recognition or identification security. We can catch a cold by touching a biometric system (fingerprint).

BACKGROUND/CONTEXT

Fingerprints are the oldest form of biometric identification. Modem fingerprint based identification is used in forensic science, and in biometric systems the such as civilian use of identification devices. Despite widespread

Twins

have

identical

biometric

traits

(identical

fingerprints, irises ... ). This is the same clones.


fingerprints, there is little statistical theory on the uniqueness of fingerprint minutiae. A fingerprint is formed from an impression on a surface of composite curve segments. A ridge is defined as a single curved segment, and a valley is the region between two adjacent ridges. The minutiae, which are the local discontinuities in the ridge flow pattern, provide the details of the ridge-valley structures, like ridge endings and bifurcations. There are 50 to 150 minutiae on a single fingerprint image. Features such as the type, direction, and location of minutiae are taken into account when performing minutiae extraction. The work of F.Galton defined a set of Galton Features for fingerprint identification, which since then, has been refines and extended to include additional types of fingerprint features. However, most of these features are not used in automatic fingerprint identification systems. Instead the set of minutiae types are restricted into only two types, ridge endings and bifurcations, as other types of minutiae can be expressed in terms of these two features types. Ridge endings are the points where the ridge curves terminates, and bifurcations are where a ridge splits from a single path to two paths at a YA.

Stolen body parts can be reused. Biometric features can be reconstructed from the template. Making a fake finger is easy.

The inability of fingerprint systems to enroll children and small Asian women. III. PROJECT SPECIFICATION

Project Description
The goal of this project is to daily attendance of employee

through fingerprint. The project is design and implements software architecture for fingerprint analysis. The system should be able to extract key features from a scanned fingerprint image and to compare these with a database of known fingerprint images and/or extracted feature sets. For this project we provided with a set of previously acquired fingerprints and a working fingerprint sensor with driver software for Windows. Our expectation had fulfilled by most of the algorithm development which executed in C# dot net and this work done on a Windows PC.

978-1-4244-9324-1/11/$26.00 2011 IEEE

499

B.

Project Task
The project can be split into a set of principle tasks

of project parameters are tentative, the plan will always need to be modified. A structure of BAS software development plan is described below IV. INTRODUCTION Here we describe the brief objectives of the BAS project and
A.

representing a progression towards the end goal of a working fingerprint analysis system. 1. We had must reviewed techniques for analyzing fingerprints and performing pattern recognition on sets of fingerprints. Several of the most promising algorithms/ techniques had implemented in C# .net and initial testing performed on the test set of fingerprint image provided. 2. The Biometric Attendance System software architecture for the main system was designed; the main subsystems required were determined and a method of implementing a full system was evaluated; work 3. We architecture and several were of a of the functional and was
B.

set

out

the

constraints

which

affect

the

project

management.

Objectives

Computerize the daily attendance system Attendance by fingerprint Protect the proxy which
IS

doing

III

daily

attendance

Constraints

subsystems were implemented. analyzed algorithms analysis implemented fingerprint integrated with the fingerprint sensor, and real-time acquisition and demonstrated; an improvements in processing speed and implemented and demonstrated.
4.

Budget 1. 2. 3. Veridicom Fingerprint Sensor RS.8,500 Expenditure for collection of data and information Rs.2500 Total budget is Rs. 1 1 ,000

Improvements in the analysis of an acquired image may be achieved through image processing; combining multiple acquired images to provide an enhanced composite image; or more sophisticated statistical or mathematical approaches.

C.

Methods

A rough task breakdown for this project is as follows: Examine and review available literature on image enhancement and minutiae extraction techniques.

Develop a series of image enhancement techniques to aid the minutiae extraction process. Develop a set of reliable techniques to extract the minutiae from fingerprint images. Evaluate the performance of the techniques using the fingerprint data set. Use existing techniques as the of benchmark the for

5.

Improvements in pattern matching may be achieved through various pattern recognition approaches; the students should evaluate several approaches, developing an evaluation methodology which enables a comparison in terms of improved recognition and a reduction in terms of false positives and negatives.

comparing developed.

the

performance

technique

Integrating the techniques of 4 and 5 with the real-time acquisition of fingerprints will add significant bonus value.
C.

After reliable minutiae detection techniques have been developed and tested, then statistical analysis experiments on the fingerprint data set can be

Project Planning
Effective management of a software project depends on planning the progress of the project. We

thoroughly

performed and documented.


(Employee Fingerprint Table) EmpfPrlnt

anticipated problems which arose and prepared solutions to the project problems. A plane, drawn up of a project, we used as the driver for the project. The initial plane evolves as the project progress and better information. The planning process starts with an assessment of the constraints (required delivery date, overall budget, etc) affecting the project. This is carried out in conjunction with an estimation of project parameters such as its structure, size, and distribution of functions. The progress milestones and deliverables are then defined. The process then enters a loop. A schedule for the project is drawn up and the activities defined in the schedule are initiated or given permission to continue. After some time usually about 2-3 weeks, progress is reviewed and discrepancies noted. Because initial estimates

[j]EWlD O FPRlNT

(Employee Profile Table)

(Attendance Table)

Fig.1

500

orientation and ridge frequency parameters. However, in practice, this does not pose a significant generally limitation place as fingerprint matching techniques more

emphasis on the well-defined regions, and will disregard and image if it is severely corrupted.
(Fail)

Overall, the results have shown that the implemented enhancement algorithm is a useful step to employ prior to minutiae extraction. The Crossing Number method was then implemented to perform extraction of minutiae. Experiments conducted have shown that this method is able to accurately detect all valid regions, and will disregard an image if it is severely corrupted. However, there are cases where the extracted minutiae do not correspond to true minutiae. Hence, an image post processing stage is implemented to validate the minutiae. The experimental results from the minutiae validation algorithm indicate that this additional post processing stage is effective in eliminating various types of false minutiae structures. In combination with the implemented techniques for image enhancement and minutiae extraction, preliminary experiments on the statistics of fingerprints were conducted on a sample set of fingerprint images. Three types of statistical data were collected, which include minutiae density, distance between neighboring minutiae, and ridge wavelength. Overall, we have implemented a set of reliable techniques for fingerprint image enhancement, minutiae extraction

(a). Flow

Chart of

Fingerprint

Databue Fingerprint

fingerprint matching and classification. These techniques we implemented for employer daily attendance system. Through which employers attend you by fingerprint only enter their employer ID and put his finger on sensor. V. Our project (BEAS)"

CONCLUSION
Employer Attendance System

"Biometric

is an extensible work for any organization or

ce) (b). Flow Chart of Fingerprint Matching (Attendan

company in this fast world. Keeping the view of research still there is a lot of improvement work and flexibility for the coming technologies in the various demanding directions. The language which we have is very vast and even the under Microsoft products is trying to rule over the Information Technology, So we hope that this project will be the point of interest for our successors to be enhanced further to market it compatible requirements. with the demands of the organization

Fig.2 ERD Model & Flow Charts of Systems

D.

Project Evalution
The primary focus of the work in this project is on the of fingerprint images, and the subsequent

enhancement

extraction of minutiae. Firstly, we have implemented a series of techniques for fingerprint image enhancement to facilitate the extraction of minutiae. Experiments were then conducted using a combination of both synthetic test images and real fingerprint images in order to provide a well-balanced evaluation on the performance of the implemented algorithm. The use of synthetic images ha provided a more quantative measures of inspection, but can provide a more realistic evaluation as they provide a natural representation of fingerprint imperfections such as noise and corrupted elements. The experimental results have shown that combined with an accurate estimation of the orientation and ridge frequency; the Gabor filter is able to effectively enhance the clarity of the ridge structures while reducing noise. In contrast, for low quality images that exhibit high intensities of noise, the filter is less effective in enhancing the image due to inaccurate estimation of the

REFERENCES Amengual, J.C, Juan, A, Perz, J.e., Prat, F, SEZ, S., and Villar, J, M, "Real time minutiae extraction in fingerprint images", proceedings of 6th International conference on Image Processing and its Applications , Jully 1997,pp 87 1-875 [2] Dankmeijer, J., Waltman, J.M, and Wild, AG.D "Biological foundations for forensic identification based on fingerprints." Acta Morphological Neerlando scandivancia 18,1 (1980),67-83 [3] Guo, Z, and Hall, R.W "Parallel thinning with two-sub iteration algorithms", communications of the ACM 32,3 (March 1989),359-373. [4] Hong, L, Wan, Y and Jain, A.K."Fingerprint image enhancement: Algorithm and performance evaluation", IEEE transactions on Pattern Analysis and Machine Intelligence 20, 8(1998),777-789. [I]

50 1

Potrebbero piacerti anche