This chapter begins with the brief discussion of the background of the study.Biometrics, more specifically, fingerprint recognition shall be discussed in this study.The main goal, which is to automate the election with the use of fingerprint scanner, willfurther be given importance. Objectives are also enumerated under this chapter. Inaddition to this, the scope and delimitation are also given into consideration. And toconclude, the significance of the study will end this chapter.
1.1 Background of the Study
Traditional methods of personal authentication, such as keys, cards, PINs andpasswords are becoming less convenient and less secure as they are under constantattack from more and more sophisticated cyber-criminals. Biometrics is the most secureand convenient authentication tool. It can't be borrowed, stolen, or forgotten, and forgingone is practically impossible. Replacement part surgery, by the way, is outside thescope. Biometrics measure individuals' unique physical or behavioral characteristics torecognize or authenticate their identity. Common physical biometrics include fingerprints;hand or palm geometry; and retina, iris, or facial characteristics. The most mature, mostwidely accepted and therefore most often used biometric technology is fingerprintrecognition. We find it really interesting and were very challenged on putting thistechnology in to our annual Central Student Council election to ensure a fraud less andunintrusive election. But just on the smaller scale, we would like to implement it first inour annual AECES election.A fingerprint looks at the patterns found on a fingertip. There are a variety of approaches to fingerprint verification. Some emulate the traditional police method of matching minutiae; others use straight pattern-matching devices; and still others are a bitmore unique, including things like moiré fringe patterns and ultrasonic. Some verificationapproaches can detect when a live finger is presented; some cannot. A greater varietyof fingerprint devices is available than for any other biometrics. As the prices of thesedevices and processing costs fall, using fingerprints for user verification is gainingacceptance—despite the common-criminal stigma.This project thesis is based exclusively on fingerprints, due to the relatively lowcost, small size, and ease of integration of fingerprint authentication devices. The