Chapter One: 1.1 Background of The Study
Chapter One: 1.1 Background of The Study
INTRODUCTION
Attendance management of students in institution can be rigorous using the conventional method
of paper sheets and old file system method. Every academic institution poses some standards
concerning how attendance is to be confirmed for student in classes, laboratory sessions and
examination halls. That is why keeping the accurate record of attendance is very important. The
approach of using paper sheets and the old file system to confirmed students has been in use for
years. Also in institution, tracking and monitoring student time of attendance could be tedious
task, time consuming and as well prone to errors. As an alternative to traditional manual clocking
process by students in classes or during examination, biometrics characteristics can be used for
authenticating students. This research will focus on developing Fingerprint based Biometric
Student Attendance Monitoring System. The fingerprint Biometrics is adopted in this research
work for the fact it is one of the most successful applications of biometric technology. In the
manual signing processes, where lecturer give a sheet of paper to student to write their names
and signature as a form of confirming their presence for a particular class session, falsification in
student attendance mostly occur a situation where by a student can sign on behalf of his or her
colleague as being present in the class when not true can be so difficult to prevent from
happening especially for large classes where row count can takes longer time International
Researcher refers to Biometric as a solution for detecting user’s identity and security challenges
emanating in this modern day. Biometric identification is any automatically measurable, robust
1
and distinctive physical characteristic or personal trait that can be used to identify an individual
Biometric is a field of technology that uses automated methods for identifying and verifying a
person based on physiological and behavioral traits. Because some parts of the human body is
use in biometrics, the issue of getting lost is not possible and for password to be easily guess can
be easily avoided. Also, utilizing biometrics in most cases can be said to be more efficient when
speed is considered and convenient than employing password and ID cards method.
Using a particular person fingerprint as a form of authentication is just like using natural physical
data as a password. The benefit of using biometric authentication is that it is absolutely distinct
to each person. There are no two different individuals with the same fingerprint, it is difficult and
impossible for one another to have the same fingerprint, and fingerprints from different people
can never be the same. Also, a fingerprint can never be guess by a criminal, such as a password
which imposter can easily predict using a user birth date or any other common password.
Infiltration is very hard to come by due to the fact that criminal will not be able to snoop around
to steal user password when using ATM with the 4-digit pass code (Valasquez 2013).
Fingerprint can be categorize as one of the most mature biometric traits and is accepted in courts
of law as a legitimate proof of evidence. Fingerprints are adopted in forensic analysis globally in
investigations of criminal. More recently, there are growing numbers of individuals and
commercial users that are currently using or strongly putting into consideration of using
fingerprint-based identification for no any other reason other than the matching performance
Although there are so many positive impacts for using biometric authentication, however, unlike
username and password, biometric data is a physical feature of a person that is fixed and cannot
2
be change. If a person could have access to adequate scan another person fingerprint, that scan
has the capability to trick the Touch ID system. In that case, the fingerprint features of a person
can’t be change consequently a criminal can’t be prevented from having access to your personal
information or files. As fingerprint scanning becomes more widely accepted anywhere anytime,
this may become a substantial challenge. A criminal can have access to different accounts
because with one fingerprint, a criminal may have access to multiple accounts that implemented
The traditional system is still mostly used in lecture room or laboratory session in most
institution today. Lecturer or instructor will give out a sheet of paper containing list of student’s
name to sign or in some cases, the student will be the ones to write their names, student id and
matriculation number to indicate their presence for a particular class. Falsification in student
attendance does occur rampantly in the traditional method. For example, another student can
easily sign an attendance on behalf of another student. In other to prevent this problem, it is
recognition that will be employed to track and keep the attendance of every student in a
particular class. The security of the existing attendance system that are now use in classroom
(signature system) can be easily compromised. Some students can master other student’s
signature. Thereby, helping their colleague who are absent for a particular class to sign the
attendance sheet using the duplicated signature. The Fingerprint Attendance monitoring system
designed in this research work for student is a more secure platform where students mark their
3
1.3 Aim and Objectives
The aim of the study is to design and develop a reliable, scalable and cost effective Fingerprint
based Student Attendance Monitoring system. This is to be achieved by the following objectives:
(i) To carry out the analysis of manual processes involved in class attendance and
examination attendance.
The scope of this work is to develop a Fingerprint Based Student Attendance monitoring System
that will improve how attendance management is done by using fingerprint as a form
authentication for proof of attending a class. The system will be a window based application
developed using Microsoft Visual Basic.net as the preferred programming language for building
the user interface and Microsoft SQL Server for database design. It does not cover other aspects
of biometric.
The efficiency of the scanner can be reduced due to the roughages in the captured images which
are often caused by worn-out or cut or dirt’s found on fingerprint. Therefore, there is every
possibility that enrolled users can be rejected by the system. Also the scanner or sensor cannot
distinguish between a real and an artificial finger; therefore it is possible to fool the scanner. In
fingerprint as in the case of password because user finger biometric. Finally, since the system will
4
be design using Visual Basic.net, it won’t be able to run on any other platforms other than
The System for Students using fingerprint Biometric will eliminate the use of paper in manual
signing processes and all the risk associated with it. One of the risks of using a paper in class
attendance is that it can be easily misplaced and students cheat by signing for each other not
present in the class thereby defeating the aim of taking the attendance. Tracking and monitoring
students time of attendance could be tedious, time consuming and susceptible to error. Thus, the
The System also allows the institution management to track or investigate student class
attendance in a particular course having poor attendance thereby enabling the management to
rectify the situation by providing the necessary interventions. The system provide high level of
security whereby making it impossible for imposters and impersonators in making their ways to
examination halls. The System using fingerprint Biometric will keep historical data making it
especially during classes, tutorials, laboratory sessions and examination during which heavy
security are normally deploy to validate student’s identity in order to cob imposters, with the use
of Authentication System the number of security personnel will be greatly reduce. Most
lecturers’ handout sheet of paper for their class attendance, which can easily be misplaced or
damaged and poses a lot of stress in cumulating grades for their students. The system allows the
lecturer to monitor each student attendance, track down truants and take the appropriate action.
5
Thus, the system eliminates all these downsides. The Authentication system is not only useful to
the institutions and lecturers alone, even the students benefit a great deal by reducing the stress in
queuing up which result in delay and often time in the damage of the attendance sheet.
Biometric Verification is any means by which a person can be uniquely identified by evaluating
Fingerprint sensor is an electronic device used to capture a digital image of the fingerprint
pattern.
Rapid Application Development is a concept that products can be developed faster and of
higher quality.
Authentication is the process of determining whether someone or something is, in fact, who or
Use Case Diagram is used to show scenarios used for understanding the requirements of the
system and to show the interaction between the user and the system.
Flow chart or Activity Diagram is a Unified Modeling Language that represents the graphical
workflows of stepwise activities and actions with support for iteration, choice and concurrency.
6
CHAPTER TWO
LITERATURE REVIEW
Biometrics is the science and technology of measuring and breaking down natural information.
In data innovation, biometrics relates to technologies that examine and measure physical human
body features, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns
The process of Biometric validation is way by which an assessing of some spotting biological or
traits can be distinctly identified in an individual. These unique identifiers constitute retina,
earlobe geometry, iris patterns, fingerprints, hand geometry, voice waves, earlobe geometry
DNA, and signatures. The voice waveform recognition method with tape recordings in telephone
wiretaps of verification which has been utilized for so many years is now majorly being used in
research facilities for access to restrictively databanks. Law enforcement has implemented
quality and reliability. Mostly industries utilize Hand geometry for providing physical access to
buildings. For people who try to impersonate another individual, earlobe geometry is utilized to
detect their identity. Signature comparison is not referring to as being dependable or reliable in
isolation to other method of biometric verification but provides an additional level of check or
identification and access control and also being implemented to detect individuals in groups that
are being watch or under surveillance (Jain, Anil K, Ross, Arun , 2008).
7
2.2 History of Biometrics
The expression “Biometrics” is gotten from the Greek words “bio” (life) and “metrics” (to
measure) (Rood and Hornak, 2008). Automated biometric systems have just become useable
over the last few decades, because of substantial improvement in the area of image and computer
processing. Although biometric technology is a subject of twenty first century, nevertheless the
Biometrics has its root as back thousands of years. The ancient Egyptians and the Chinese has a
major part in biometrics history. The focus today is on utilizing biometric face recognition, iris
recognition, fingerprint, retina recognition and recognizing physical features of human being to
put a stop to terrorism predicament and improve security measures. The first recorded systematic
capture of hand and finger images for recognizing purposes was during 1858 utilizes by Sir
William Herschel, Civil Service of India, who recorded a handprint on the back of a contract for
each worker to distinguish employees (Komarinski, 2004). During 1870, Alphonse Bertillon
created a technology for recognizing people which is solely dependent on elaborate records of
their body measurements, physical descriptions and photographs. This method was termed as
“Bertillonage” or anthropometrics and the utilization was terminated in 1903 when it was
apparent that some people have same measurements and physical characteristics (State
University of New York at Canton, 2003). Sir Francis Galton, in 1892, created a classification
system for fingerprints using minutiae characteristics that is utilized by educationalists and
The FBI and West Virginia University in year 1920 established a degree program (Bachelor’s
Degree) in biometric system that is after consulting some professional associations like
International Association for Identification. This serves as the first biometrics based degree
8
In April 2002, a Staff Paper on palm print technology and Integrated Automated Fingerprint
Identification System (IAFIS) palm print capabilities was submitted to the Identification Services
(IS) Subcommittee, Criminal Justice Information Services Division (CJIS) Advisory Policy
Board (APB). The Joint Working Group called “for strong endorsement of the planning, costing,
and development of an integrated latent print capability for palms at the CJIS Division of the
FBI.” As a result of this endorsement and other changing business needs for law enforcement,
the FBI announced the Next Generation IAFIS (NGI) initiative. A major component of the NGI
initiative is development of the requirements for and deployment of an integrated National Palm
Print Service (2002 Palm Print Staff Paper is submitted to Identification Services Committee).
begins). On May, 28 2003, The International Civil Aviation Organization (ICAO) adopted a
global, harmonized blueprint for the integration of biometric identification information into
passports and other Machine Readable Travel Documents (MRTDs) … Facial recognition was
selected as the globally interoperable biometric for machine assisted identity confirmation with
the European Commission whose overall vision is to establish the European Union as the World
marketplace. The forum also acts as the driving force for coordination, support and strengthening
The United States Visitor and Immigrant Status Indication Technology (US-VISIT) program is
the cornerstone of the DHS visa issuance and entry I exit strategy. The US-VISIT program is a
9
continuum of security measures that begins overseas at the Department of State’s visa issuing
posts, and continues through arrival to and departure from the US. Using biometrics, such as
digital inkless fingerprints and digital photographs, the identity of visitors requiring a visa is now
matched at each step to ensure that the person crossing the US border is the same person who
received the visa. For visa-waiver travelers, the capture of biometrics first occurs at the port of
entry to the US. By checking the biometrics of a traveler against its databases, US-VISIT verifies
whether the traveler has previously been determined inadmissible, is a known security risk
(including having outstanding wants and warrants), or has previously overstayed the terms of a
visa. These entry I exit procedures address the US critical need for tighter security and its
ongoing commitment to facilitate travel for the millions of legitimate visitors welcomed each
year to conduct business, learn, see family, or tour the country(2004 US-VISIT program
of Defense system implemented to improve the US Government’s ability to track and identify
national security threats. The associated collection systems include the ability to collect, from
enemy combatants, captured insurgents, and other persons of interest, ten rolled fingerprints, up
to five mug shots from varying angles, voice samples (utterances), iris images, and an oral swab
In 2004, President Bush issued Homeland Security Presidential Directive 12 (HSPD-12) for a
departments and agencies will issue to their employees and contractors requiring access to
Federal facilities and systems. Subsequently, Federal Information Processing Standard (FIPS)
201, Personal Identity Verification (PIV) for Federal Employees and Contractors, specifies the
technical and operational requirements for the PIV system and card. NIST Special Publication
10
800-76 (Biometric Data Specification for Personal Identity Verification) is a companion
document to FIPS 201 describing how the standard will be acquiring, formatting and storing
fingerprint images and templates for collecting and formatting facial images; and specifications
for biometric devices used to collect and read fingerprint images. The publication specifies that
two fingerprints be stored on the card as minutia templates. In 2004, Connecticut, Rhode Island
and California established statewide palm print databases that allow law enforcement agencies in
each state to submit unidentified latent palm prints to be searched against each other’s database
sponsored challenge problem posed to develop algorithms to improve specific identified areas of
interest in face recognition. Participating researchers analyze the provided data, try to solve the
problem, and then reconvene to discuss various approaches and their results – an undertaking
The broad US patent covering the basic concept of iris recognition expired in 2005, providing
marketing opportunities for other companies that have developed their own algorithms for iris
recognition. However, the patent on the iris Codes implementation of iris recognition developed
by Dr. Daugman will not expire until 2011(2005 US patent for iris recognition concept expires).
At the 2005 Biometrics Consortium conference, Sarnoff Corporation demonstrated Iris on the
Technology Innovation Center (ITIC), and previously by the Defense Advanced Research
Projects Agency (DARPA). The system enables the collection of iris images from individuals
11
2.3 Types of Biometric Devices Available
There are several types of biometric data use commonly today. Each of these devices has a
The different types of biometric that are frequently in use today are devices that capture data in
various formats using different mechanism. The method of production and trait of the biometric
data indicates the encroaching of the protocol for enrollment and authentication of users
(Woodward, Nicholas 2003). The associated changes in the process of measurement and
production can give a vicious person an access and allowing them to alter the security shielded
around the biometric system by interfering with the operation of the mechanism for capturing or
by changing features of the biometric. There are many types of biometric devices employed
today. Some of these biometric devices are generally detected in commonplaces such as movies.
Biometrics is essentially the identification of human features that are distinct to each person. The
best way to keep your devices safe and ascertain people don’t illegally have access to your
personal belongings such as files utilizing is to implement a any biometric technology available
in the market.
These scan are the distinct biometric feature/pattern in each individual’s iris, and compares it
with a certain number of distinct recognizing patterns which distinguish each individual
separately from other people. In a retinal scan, at the back of the eye, a biometric format is
shaped by recording the patterns of capillary blood vessels. Iris scanning can be carried out
remotely utilizing a high-resolution camera and formats generated by a technique similar to that
of retinal scanning. Iris scanning and retinal scanning are both used to distinguish a person as
12
indicated by their distinct pattern. Despite their efficiency, implementing them is more costly and
complex. The retina of human being is a thin tissue constituted by neural cell which is located in
the posterior portion of the eye. The composite structure of the capillaries that supply the retina
Retinal scanners are regularly used for authentication and identification purposes. Retinal
scanning has been implemented in several places such as several government agencies, prisons,
ATM validation of authentic owners and guiding against fraud, medical application such as
transmitted diseases (AIDS, Malaria, Chicken pox and e.t.c). The network of blood vessels in the
retina of human being cannot be genetically determined in entirety and for that reason even twins
There are cases where by retinal patterns may be modified for people suffering from of diabetes,
glaucoma or retinal degenerative disorders, however, the retina generally is permanent from
child birth till death. Considering its distinct and permanence feature, the retina happens to be the
most accurate, authentic of all the biometric except DNA. Its accuracy level has been concluded
by advocates of retinal scanning that its error rate is estimated one in a million (Homer, Schell,
2012). A biometric identifier known as a retinal scan is used to represent the distinct patterns of a
person's retina. The blood vessels in the retina can promptly absorb light more than the
subordinate tissue and can be recognized more easily in the presence of lighting. A retinal scan is
performed by absorbing an unperceived beam of low-energy infrared light into a person’s eye as
they look through the scanner's eyepiece. This beam of light draws a similar pattern like a path
on the retina. During the scan process, the total reflection differs due to the absorbent nature of
retinal blood vessels of that light than other part of the eye. The format of the variations from the
13
2.3.2 Iris Scanner
pattern-recognition techniques on video images of the iris of a person’s eyes, whose complex
random patterns are distinct and be spotted from a far range. Digital formats which are referred
to as template are converted from these patterns by using mathematical and statistical algorithms
which allow the identification of an individual or someone trying to impersonate the legitimate
person. Globally, there are millions of individuals in so many countries that have been enrolled
into the iris recognition systems for the purpose convenience in passport-free automated border-
crossings, and some national ID systems based on this technology are being deployed. The
significant benefit of iris recognition, apart from its utmost resistance to false matches and speed,
is the stability of the iris as an internal, protected, yet externally visible organ of the eye.
14
Figure2.2 Iris scanner
The major feature that depicts iris of the eye as the most ideal and accurate section of human
body for biometric recognition is that it is an internal organ which is better guided from damage
and wear by extremely sensitive and transparent membrane (cornea). This characteristic makes it
more better option to fingerprint, which can be difficult after years of rigorous involvement in
The iris is mostly flat, and its geometric configuration is only controlled by two complementary
muscles (the sphincter pupillae and dilator pupillae) that control the diameter of the pupil. This
makes the iris shape far more predictable than, for instance, that of the face. The iris has a fine
texture that like fingerprints is determined randomly during embryonic gestation. Like the
fingerprint, it is very hard (if not impossible) to prove that the iris is unique (Christine, Modi,
2008).
15
2.3.3 Fingerprint Scanner
When considering the price of biometric identification scanners available in the market today,
fingerprint scanning is always on the lower end. There are some fingerprint scanners that can
only scan the actual print while the costlier scanners can capture the shape and size of the thumb,
presence of blood in the fingerprint and other physical characteristics on a finger. The expensive
scanner can capture a 3D image of the fingerprint which in turn makes it more difficult for such
fingerprint to be duplicated. The process of acquiring image by the scanner is either though
fingerprints. The examining of fingerprints for the purpose of generally requires the comparison
of so many features of the print format. These comprise of patterns which are aggregated features
of ridges and the minutia points, that are distinct features found within this patterns. Knowing
the attributes of human skin and structure is paramount to successfully utilize some of the
technologies of imaging.
(i) Arch: In arch, the ridges will enter from one side of the finger then rise in the center
forming an arc, and then exit the other side of the finger.
(ii) Loop: The ridges enter from one side of a finger, form a curve, and then exit on that same
side.
(iii) Whorl: Ridges form circularly around a central point on the finger.
16
The arch pattern the loop pattern the whorl pattern
Minutia features
The major minutia features of fingerprint ridges are ridge ending, bifurcation, and short ridge (or
dot). The ridge ending refer to the point at which a ridge terminates. Bifurcations are points
whereby a single ridge is divided into two ridges. Short ridges are ridges which are importantly
shorter than the average ridge length on the fingerprint. Minutiae and patterns are very important
in the examining of fingerprints since there has not been any record of two fingerprints proven to
be identical.
17
Fingerprint sensors
A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint
pattern. The image captured from the sensor is referred to as a live scan, which in turn is
template is stored in a database and utilized for matching. Figure 2.4 presented some fingerprint
sensors.
Figure2.4 Scanners
18
2.3.4 Facial Biometrics
The image or video of an individual is generally views by the facial biometrics devices and then
compares it to the template stored in database. when matching is being carried out by the facial
biometrics, it compares the ratio, shape and structure of the face, the interval between the jaw,
top outlines of the eye sockets, the sides of the mouth, eyes, mouth, nose, the region of the
cheek bones and the positioning of the nose and eyes. When a user is being enroll in a facial
recognition program, various images are captured of the individual at different positions and
angles with various facial expressions. In the process of verification and identification the
individual will maintain a position facing the camera some seconds, after then the image is
verified against the template stored. In other to prevent an individual from putting on a picture
or mask when being scanned, some security criteria have been put into place. The user may be
asked to smile, nod their hand or blink their eyes during the scanning process. Also as part of
the security criteria would be to use facial thermograph to store the heat in the face.
A new method in facial recognition uses the visual details of the skin, which is captured in
standard digital or scanned images. This technique is referred to as skin texture analysis, which
turns the distinct patterns, lines, and spots obvious in an individual’s skin into a mathematical
space. Facial biometrics is very good when being utilize for facial authentication than for
identification purposes, because of the fact that an individual face can have a physical damage or
altered, disguise with a mask, etc. Environment can also affect the camera during the process of
capturing. Facial biometrics has been confirmed as a method that can improve validation and
19
Every individual on the soil of the earth has a distinct voice pattern. Although the changes can be
hardly noticeable to the human hear because it’s a slight change. Nevertheless, with the aid of
exceptional software for voice recognition, those minute variations in each individual’s speech
can be spotted, tested, and authenticated to give access only to the person owns the tone, pitch,
and volume of speech uttered. Voiceprint recognition performs its operation by comparing the
vocal patterns of an individual with template previously stored. This type of biometric has the
ability to determine duress through adequate examining of pattern of stress in the input
voiceprint. This feature gives voice recognition an advantage over other forms
Similarly to finger print, everybody has distinct handprints. A handprint Biometric Systems
scans hand and finger and the captured feature is compared with the specimen stored for the user
in the system. The user is given access or rejected based on the result of this verification.
handwritten input from sources such as paper documents, photographs, touch-screens and other
devices. The image of the written text may be sensed "off line" from a piece of paper by optical
movements of the pen tip may be sensed "on line", for example by a pen-based computer screen
complete handwriting recognition system also handles formatting, performs correct segmentation
20
When a person’s hand is place on a scanner, such user will have a distinct fingerprint pattern, as
well as the size and shape of the entire hand is also very unique. This is a more complex
approach compare to regular fingerprint scanning, and will definitely be more accurate with
minimum occurrence of falsification. Templates generated can be said to be very compact, and
the method is often sensed by users to be less invasive than other types of biometric devices.
This method works by taking a tissue sample from an individual and then sequencing and
comparing short segments of DNA. DNA technique has a very low acceptance rate because
samples have to be taken from human body and also the speed at which these samples are
processed
21
2.3.8 Deep Tissue Illumination
A relatively new method that involves illumination of human tissue by specific lighting
conditions and the identification of deep tissue patterns based on light reflection. This method is
claimed to be less prone to falsification than other forms of biometric techniques, b it is very
This method works by discovering patterns while an individual is typing on a keyboard and these
patterns are then compared against previous patterns stored. Biometrics that has to do with
keystroke have been utilized to make password entry more complex, to provide certainty that a
password was inputted by the same person that saved it by comparing the speed at which it was
typed. Some of these products are tend to be expensive than others simply because they employ
technology that is much more complex. Nevertheless, when considering the level of security
level required the amount of to acquire different types of biometric devices will be almost the
same. The features derived from the biometric are then converted into a biometric template. The
process of retrieving features from the captured data and converting it into a template are usually
important. These templates are then used as the foundation for verification during authentication.
The process by which biometric template are acquired, transmitted and stored are important
aspects of biometric security systems, because risks can surface from these are areas and
spurious attacks can be made which will compromise the integrity of the system.
22
The areas in which biometrics can be applicable are government, commercial, forensic,
institutions, access control, counter tourism, law enforcement agency, airport security and so on.
Some of these areas will be briefly discussed below as well as those areas where biometrics is
being applied.
Government
The application of biometrics in the government sector such as national ID card, correctional
facility, driver’s license, social security, welfare disbursement, border control, and passport
control. Traditionally in the government, they have used token based systems examples ID cards
and badges which are been given to people or the workers to put on. The government set up a
central database of biometric data, such as fingerprints and digital passport photographs of all
foreign nationals who apply for residence or are already residing in their nations. Maintaining a
central database would prevent people using another person’s identity or using false documents
Commercial
In this area, biometric is generally applicable for logging in to a computer network, electronic
data security, e-commerce, Internet access, ATM, credit card, physical access control, cellular
phone, PDA, medical records management, and distance learning. The ability to identify a
customer had greatly affected trading, as part of a general group or specifically. Monitoring the
attendance of employees becomes a very easy task as employee can clock in and out the time
they get or leave the office using iris scan or thumb print.
Forensic
23
In forensic, biometrics is in use for corpse identification, criminal investigation, terrorist
identification, parenthood determination, and missing children. The cost of such implementations
of biometrics is very high and for existing surveillance systems the success rates vary. The police
agencies have used fingerprinting as a means of identifying criminals for well over a hundred
years. Police gain the most benefit because a criminal’s biometric information such as
There are some existing related works on the application of different methods in managing attendance of
students. One of the methods proposed for monitoring attendance is embedded computer based lecture
attendance management system. In this type of system, a card is reader is interfaced with a digital
computer system and an electronic card is provided and personalizes to each user for authentication.
Authors in, used a wireless attendance management system that authenticates using the iris of the
individual. The system uses an off-line iris recognition management system that can finish all the
process including capturing the image of iris recognition, extracting minutiae, storing and
matching.
24
CHAPTER THREE
5.1 Summary
This seminar is focused on the protection of student manual attendance system using fingerprint
biometric. The fingerprint Biometrics is one of the most successful applications of biometric
technology was used in this Fingerprint Based student attendance monitoring System which
serves as an alternate for traditional manual signing processes involved in class attendance and
examination attendance. Reviewing and assessing the authentication system for student class
attendance follows a hierarchical flow from policies down through the specific actions taken to
enforce them.
Attendance is usually noted using paper sheets and the old file system, this approach has been in
use for a long time. It becomes difficult for the management to regularly update the record and
manually calculate the percentage of classes attended. For any growing institution, tracking and
monitoring student time of attendance could be tedious, time consuming and more prone to
errors. There are many concepts to understand and the technological solutions can be complex.
Dynamic institution driven solutions continue to tout a silver bullet but none ever really exists.
25
Keeping up with security threats and countermeasures requires a continuous education and
understanding.
This seminar covers the basic concepts so one’s knowledge can be outfitted and applied to the
situations that you will face as a certified IS auditor, however diverse they may be. Again for this
seminar, the focus is not only on the technical details of how this fingerprint biometric works
under the hood. Rather, it assumes that you have some base knowledge of these issues and is
geared more towards identifying the risk and control points of the authentication system. The
system’s inner workings and the exact technology used to secure them will change over time,
In chapter four, the programming languages that was chosen were Microsoft Visual Basic.net
2010 and MSSQL Server 2008 R2 those languages was discussed briefly. The implementation of
all the components were tested and integrated for proper performance and evaluation of the
system. This verifies that the system elements have been properly integrated.
5.2 Recommendations
Through analysis of the data and research conducted for this study, the school district maintain or
develop strict guidelines for student attendance and monitor factors that could hinder a student
from attending school on a regular basis. The use of encryption for files in the database transit is
an area of protection that should be visited. I strongly believe in protection. Window based
work load of colleges and university. Therefore, is highly recommended that all schools should
adopt it.
26
The system was designed to ease the lecturer work and also allow lecturer and students to use the
system without taking special training for it. Should any modification or upgrading arises it
should be done with the idea of making it a user friendly so as to make it easily accessible to
5.3 Conclusion
It can be concluded from the above discussion that a reliable, secure, fast and an efficient system
has been developed replacing a manual and unreliable system. Results have shown that this
system can be implemented in academic institutes for better results regarding the management of
attendance. This system will save time, reduce the amount of work the administration has to do
and will replace the stationery material with electronic apparatus. Hence a system with expected
results has been developed but there is still some room for improvement. Having presented a
biometric identity based fingerprint scheme. I have utilized, extended and implemented ideas in
the areas of error corrected string construction from biometric data, key generation, and pairing
based fingerprint schemes to form the components of the system. The research presented the
biometric data in the public key and described the utility of using biometric evidence in disputes
that may arise. This work has been an insight into the hidden problems; the manual attendance
system tends within daily activities. The problems are fair and need computerized authentication
27
REFERENCES
Books
1. Introducing Microsoft .NET, Second Edition author David S. Platt.
2. Joe Mayo, “Microsoft Visual Studio 2010: A Beginner's Guide”, Tata McGraw Hill, 2010.
3. Alex Mackey, “Introducing .NET 4.0: With Visual Studio 2010”, Press, USA, 2010.
WEBSITES
1. http://www.msdn.net/
2. http://msdn.microsoft.com/en-us/library/orm-9780596518455-02.aspx
3. http://www.w3schools.com/asp.net/
4. http://www.cramerz.com/aspdotnet
5. http://www.dotnetspider.net/
6. http://www.stackoverflow.com
7. http://www.codeproject.com
28
29