Biometric attendance system - IEEE Xplore

3 downloads 0 Views 327KB Size Report
Abstract - This research work has application for attendance system of employer's and students in general. The system will facilitate institutions! organization to ...
Proceedings of the 20 1 1 IEEEIICME International Conference on Complex Medical Engineering May 22 - 25,Harbin,China

Biometric Attendance System Engr. Imran Anwar Ujan and Dr. Imdad Ali Ismaili Institute of Information & Communication Technology, University ofSindh, Jamshoro, Sindh, Pakistan Pakistan Abstract - This research work has application for attendance system of employer's and students in general. The system will facilitate institutions! organization to make attendance individual in time along with data information thumb impression will be

junction. In this research, we will be dealing mainly with ridge endings and bifurcations. There literature

taken as a signature for the system entry. Main design and challenge in this system is the design of database architecture and its business logic.

Once

in

determining

this

system

would

test

experiments on the database to estimate the number of degrees of freedom within the fingerprint popUlation.

Problem There

BACKGROUND/CONTEXT

identification

devices.

systems

Despite

the

such

as

widespread

some

problems

which

face

by

fingerprint

touching a biometric system (fingerprint). •

civilian use

are

recognition or identification security. We can catch a cold by

Fingerprints are the oldest form of biometric identification. biometric

been

fingerprint features and then performing a set of matching

whether

Modem fingerprint based identification is used in forensic in

has

defined a means of forming a binary code from set of

being able to fully test hypothesis.

and

technique

system performance has been presented. Tu and Hartley

the

expected that the work in this system will reach the stage of

science,

extraction

The work of Tu and Hartley and Pankanti et al. can be

attendance by fingerprint is enough for identification. It is

II.

minutiae

examined in which a statistical framework for analyzing

statistical uniqueness of fingerprint minutiae. that

a reliable

statistical analysis of fingerprint minutiae.

The results from these experiments can be used to help us

aim

in

minutiae

implemented and tested, this can be used as the basis of

experiments can then be performed on the fingerprint data set.

main

proposed and

the enhancement algorithm works and how well it performs.

In combination with these development techniques, statistical

The

approaches

et al. will be evaluated and implemented to understand how

be evaluated on a fingerprint data set.

involved

of

enhancement,

approach to develop for this research. In particular, the

minutiae extraction. The performance of these techniques will

is

types

image

fingerprint image enhancement algorithm employed by Hong

reliable techniques for fingerprint image enhancement and

what

both

extraction from fingerprints. The literature on these techniques

The aim of this system is to implement in C#.net set of

understand

various

will be examined are reviewed in determining the best

I. AIMS AND OBJECTIVE

better

are for

Twins

have

identical

biometric

traits

(identical

fingerprints, irises ... ). This is the same clones.

of

fingerprints, there is little statistical theory on the uniqueness



Stolen body parts can be reused.

of fingerprint minutiae.



Biometric features can be reconstructed from the



Making a fake finger is easy.

A fingerprint is formed from an impression on a surface of

template.

composite curve segments. A ridge is defined as a single curved segment, and a valley is the region between two adjacent

ridges.

The

minutiae,

which

are

the

local

The inability of fingerprint systems to enroll children and

discontinuities in the ridge flow pattern, provide the details of

small Asian women.

the ridge-valley structures, like ridge endings and bifurcations.

III. PROJECT SPECIFICATION

There are 50 to 150 minutiae on a single fingerprint image. Features such as the type, direction, and location of minutiae

A.

are taken into account when performing minutiae extraction. The work of F.Galton defined a set of Galton Features for

through fingerprint. The project is design and implements

fingerprint identification, which since then, has been refines and

extended

to

include

additional

types

of

software architecture for fingerprint analysis. The system

fingerprint

should be able to extract key features

features. However, most of these features are not used in

from a scanned

fingerprint image and to compare these with a database of

automatic fingerprint identification systems. Instead the set of

known fingerprint images and/or extracted feature sets.

minutiae types are restricted into only two types, ridge endings

For this project we provided with a set of previously

and bifurcations, as other types of minutiae can be expressed

acquired fingerprints and a working fingerprint sensor with

in terms of these two features types. Ridge endings are the

driver software for Windows. Our expectation had fulfilled by

points where the ridge curves terminates, and bifurcations are

most of the algorithm development which executed in C# dot

where a ridge splits from a single path to two paths at a Y-

978-1-4244-9324-1/11/$26.00 ©2011 IEEE

Project Description The goal of this project is to daily attendance of employee

net and this work done on a Windows PC.

499

B.

of project parameters are tentative, the plan will always need

Project Task

to be modified.

The project can be split into a set of principle tasks representing a progression towards the end goal of a working

A

1.

structure

of

We had must reviewed techniques for analyzing

and

algorithms/ techniques had implemented in C# .net

A.

fingerprint image provided. Attendance

System

software

architecture for the main system was designed; the

set

and

several

of

the

which

affect

the

project



Attendance by fingerprint



Protect

the

proxy

which

IS

doing

III

B.

functional

Budget 1.

Veridicom Fingerprint Sensor RS.8,500

integrated with the fingerprint sensor, and real-time

2.

Expenditure

analyzed

algorithms

and

were

analysis

of

implemented a

fingerprint

was 3.

and implemented and demonstrated. be

achieved

through

image

C.

processing;

and

Total budget is Rs. 1 1 ,000



Examine and review available literature on image



Develop a series of image enhancement techniques to



Develop a set of reliable techniques to extract the

aid the minutiae extraction process.

through various pattern recognition approaches; the several

data

Methods

statistical or mathematical approaches. Improvements in pattern matching may be achieved evaluate

of

enhancement and minutiae extraction techniques.

enhanced composite image; or more sophisticated

should

collection

A rough task breakdown for this project is as follows:

combining multiple acquired images to provide an

students

for

information Rs.2500

Improvements in the analysis of an acquired image may

daily

Constraints •

and

We

acquisition

5.

constraints

Computerize the daily attendance system

demonstrated; an improvements in processing speed 4.

the

attendance

subsystems were implemented. 3.

out



method of implementing a full system was evaluated; architecture

is

Objectives

main subsystems required were determined and a work

plan

management.

and initial testing performed on the test set of Biometric

development

Here we describe the brief objectives of the BAS project

sets of fingerprints. Several of the most promising

The

software

IV. INTRODUCTION

fingerprints and performing pattern recognition on

2.

BAS

described below

fingerprint analysis system.

minutiae from fingerprint images.

approaches,



developing an evaluation methodology which enables

Evaluate the performance of the techniques using the fingerprint data set.

a comparison in terms of improved recognition and a



reduction in terms of false positives and negatives.

Use

existing

comparing

techniques

the

as

the

performance

of

benchmark the

for

technique

developed.

Integrating the techniques of 4 and 5 with the real-time acquisition of fingerprints will add significant bonus value.



After reliable minutiae detection techniques have been developed and tested, then statistical analysis

C.

Project Planning

experiments on

Effective management of a software project depends on thoroughly

planning

the

progress

of

the

project.

the fingerprint data

set

performed and documented.

We

anticipated problems which arose and prepared solutions to

(Employee Fingerprint Table)

the project problems. A plane, drawn up of a project, we used

EmpfPrlnt

as the driver for the project. The initial plane evolves as the

[j]EWlD O FPRlNT

project progress and better information. The planning process starts with an assessment of the constraints

(required

delivery

date,

overall

budget,

etc)

(Attendance Table)

(Employee Profile Table)

affecting the project. This is carried out in conjunction with an estimation of project parameters such as its structure, size, and distribution

of

functions.

The

progress

milestones

and

deliverables are then defined. The process then enters a loop. A schedule for the project is drawn up and the activities defined in the schedule are initiated or given permission to

Fig.1

continue. After some time usually about 2-3 weeks, progress is reviewed and discrepancies noted. Because initial estimates

500

can

be

orientation and ridge frequency parameters. However, in practice,

this

fingerprint

does

not

matching

pose

a

significant

techniques

generally

limitation place

as

more

emphasis on the well-defined regions, and will disregard and image if it is severely corrupted. Overall, the results have shown that the implemented

(Fail)

enhancement algorithm is a useful step to employ prior to minutiae extraction. The Crossing Number method was then implemented to perform extraction of minutiae. Experiments conducted have shown that this method is able to accurately detect all valid regions, and will disregard an image if it is severely corrupted. However, there are cases where the extracted minutiae do not correspond to true minutiae. Hence, an image post processing stage is implemented to validate the minutiae. The experimental results from the minutiae validation algorithm

(a). Flow

Chart of

indicate that this additional post processing stage is effective

Fingerprint

in eliminating various types of false minutiae structures. In combination with the implemented techniques for image enhancement

and

minutiae

extraction,

preliminary

experiments on the statistics of fingerprints were conducted on a sample set of fingerprint images. Three types of statistical data were collected, which include minutiae density, distance between neighboring minutiae, and ridge wavelength. Overall, we have implemented a set of reliable techniques for

fingerprint

image

enhancement,

minutiae

extraction

fingerprint matching and classification. These techniques we

Databue Fingerprint

implemented for employer daily attendance system. Through which employers attend you by fingerprint only enter their employer ID and put his finger on sensor. V. Our project (BEAS)"

coming technologies in the various demanding directions. The language which we have is very vast and even the under

Project Evalution

Microsoft products is trying to rule over the Information

The primary focus of the work in this project is on the of

fingerprint

images,

and

the

Technology, So we hope that this project will be the point of

subsequent

interest for our successors to be enhanced further to market it

extraction of minutiae.

compatible

Firstly, we have implemented a series of techniques for Experiments

were

then

conducted

using

a

[I]

the implemented algorithm.

The

use of

synthetic images ha provided a more quantative measures of inspection, but can provide a more realistic evaluation as they provide a natural representation of fingerprint imperfections such as noise and corrupted elements. The experimental results have shown that combined with an accurate estimation of the orientation and ridge frequency; the Gabor filter is able to effectively enhance the clarity of the ridge structures while reducing noise. In contrast, for low quality images that exhibit high

intensities

of

noise,

the

filter

is

less

effective

demands

of

the

organization

Amengual, J.C, Juan, A, Perz, J.e., Prat, F, SEZ, S., and Villar, J, M, "Real time minutiae extraction in fingerprint images", proceedings of 6th International conference on Image Processing and its Applications , Jully 1997,pp 87 1-875 [2] Dankmeijer, J., Waltman, J.M, and Wild, AG.D "Biological foundations for forensic identification based on fingerprints." Acta Morphological Neerlando scandivancia 18,1 (1980),67-83 [3] Guo, Z, and Hall, R.W "Parallel thinning with two-sub iteration algorithms", communications of the ACM 32,3 (March 1989),359-373. [4] Hong, L, Wan, Y and Jain, A.K."Fingerprint image enhancement: Algorithm and performance evaluation", IEEE transactions on Pattern Analysis and Machine Intelligence 20, 8(1998),777-789.

images in order to provide a well-balanced evaluation on the of

the

REFERENCES

combination of both synthetic test images and real fingerprint performance

with

requirements.

fingerprint image enhancement to facilitate the extraction of minutiae.

Employer Attendance System

there is a lot of improvement work and flexibility for the

Fig.2 ERD Model & Flow Charts of Systems

enhancement

"Biometric

is an extensible work for any organization or

company in this fast world. Keeping the view of research still

ce) (b). Flow Chart of Fingerprint Matching (Attendan

D.

CONCLUSION

in

enhancing the image due to inaccurate estimation of the

50 1