You are on page 1of 8

ACKNOWLEDGEMENT

We are very thankful to everyone who supported us for this project and give these
guidance to complete our thesis work effectively and moreover on time.

We are equally grateful to our faculty Prof. D. P. KAPSE sir, who gave us moral
support and guided us in different matters and solution reading the topic.

We feel immensely proud in extending our heartiest thanks to Mr. D. P. KAPSE sir.
For providing us a platform to improve in various fields.

They went out of there way and provided us open hearted and help and council. They
have been our source of inspiration for us and there experience and knowledge have helped us
for learning and giving this project the shape it has assumed.

VISHAL KUMAR

(TEA-570)

SHUBHAM GHUGE

(TEA-572)

DHEERAJ KATARE

(TEA-578)

VARUN DUBEY

(TEA-581)

ABSTRACT
Biometric device is a security identification and authentication device. Such devices
use automated methods of verifying or recognising the identity of a living person based on a
physiological or behavioral characteristic. These characteristics include fingerprints, facial
images, Iris prints and voice recognition.

• 1858 – First systematic capture of hand images for identification purposes is


recorded.

The characteristic of the human body are used to access information by the users.
According to these characteristics, the sub-divided groups are:

• Chemical biometric devices: Analyses the segments of the DNA to grant access to
the users.

• Visual biometric devices: Analyses the visual features of the humans to grant
access which includes IRIS recognition, Face recognition, Finger recognition and
Retina Recognition.

• Behavioural biometric devices: Analyses the Walking Ability and Signatures


(velocity of sign, width of sign, pressure of sign) distinct to every human.

• Olfactory biometric devices: Analyses the odour to distinguish between varied


users.

• Auditory biometric devices: Analyses the voice to determine the identity of a


speaker for accessing control.

Biometrics are being used to establish better and accessible records of the hours
employee's work. With the increase in "Buddy Punching”( a case where employees clocked
out coworkers and fraudulently inflated their work hours) employers have looked towards
new technology like fingerprint recognition to reduce such fraud. Additionally, employers are
also faced with the task of proper collection of data such as entry and exit times. Biometric
devices make for largely foul proof and reliable ways of enabling to collect data as employees
have to be present to enter biometric details which are unique to them.
CHAPTER 1: Introduction

1. Introduction

STUDENTS ATTENDANCE BIOMETRIC SYSTEM (SABS) is basically a


fingerprint attendance system. SABS is portable and can comfortable fit in anyone’s hand.

Designing a student attendance management system based on fingerprint recognition


and faster one to many identification that manages records for attendance

Biometrics refers to metrics related to human characteristics.Biometrics


authentication is used in computer science as a form of identification and access control. It is
also used to identify individuals in groups that are under surveillance.Now a days people are
getting more influenced by it.Latest Android smart phones also carries this special feature of
finger print sensor.

Every organization whether it be an educational institution or business organization,it


has to maintain a proper record of attendance of students or employees for effective
functioning of organization. Designing a better attendance management system for students
so that records be maintained with ease and accuracy was an important key behind
motivating this project. This would improve accuracy of attendance records because it will
remove all the hassles of roll calling and will save valuable time of the students as well as
teachers. Image processing and fingerprint recognition are very advanced today in terms of
technology.

It was our responsibility to improve fingerprint identification system. We decreased matching


time by partitioning the database to one-tenth and improved matching using key based one to
many matching.

1
CHAPTER 2: Problem statement

2. Literature Review

2
CHAPTER 3 : Design Methodology
3. Design Methodology

Figure 1 Design

3.1 Data Flow Diagrams

1 : REGISTRATION: During registration process first place finger store it in databse and retrieve
finger during authentication process.

2:AUTHENTICATION: In this process the new fingerprint placed is compared with the fingerprint that
is placed in database, if match found authentication successful, if not denied.

3
CHAPTER 4:Result
4.Result

Figure 3 initial Phase

Figure 4 Final phase

CHAPTER 5:Future Scope


4
5. Future Scope

Regarding our fingerprint attendance system, we are planning introduce more techniques and
also trying to keep it low of cost.

Emphasis will be on making the system maintenance easy.

New techniques such as sending data directly to the server and will make it portable .

Fingerprint recognition could be enhanced to give better experience and avoiding false
reading.

Thus ensuring this addition features the system would be revolutionary.

5
CHAPTER 6: References

6. References

1. https://www.circuito.io/
2. https://www.youtube.com/channel/UCZHxq0gM-m-sDQIjPl8Z69w
3. https://randomnerdtutorials.com/fingerprint-sensor-module-with-arduino/
4. BOOKS

• Arduino: The complete guide to Arduino for beginners, including projects, tips, tricks,
and programming

Author: BY JAMES ARTHUR

You might also like