ABSTRACT
This preliminary document covers the arrangement phase of a final year BSc (Hons) computer science project aiming to develop a fingerprint recognition application to allow logging of student attendance at lectures. The introduction offers some background to the project and establishes the aims and objectives of the project overall. Following on from the introduction, the literature review presents an account of research material that provides the basis for the project. This material includes a number of texts, journals and research papers as well as additional information sourced from the Web. As drawn from the literature, the subject areas covered include; history and background to modern biometrics; technological, social, organizational and environmental influences; key technologies in the market today; design issues, including security, performance and testing.
In chapter 3, attention turns to requirements analysis for the development of a fingerprint recognition system. The process follows a requirements engineering approach to development by formally establishing user requirements and allowing continuous requirements assessment throughout the project life-cycle. The design approach and methodology used to model the problem are also addressed in chapter 4, in this chapter (4) we also deals with high level design issues such as requirements engineering in the solution domain; assessment and selection of technology options; project management, implementation strategy and evaluation of user requirements.
TABLE OF CONTENTS
DECLARATION…………………………………………………………………………………………….. i
CERTIFICATION…………………………………………………………………………………………… ii
DEDICATION………………………………………………………………………………………………. iii
ACKNOWLEDGEMENT………………………………………………………………………………. iv
ABSTRACT………………………………………………………………………………………………….. vi
TABLE OF CONTENTS……………………………………………………………………………….. vii
CHAPTER ONE…………………………………………………………………………………………….. 1
1.0 Introduction……………………………………………………………………………………………… 1
1.1 Statement of the problems………………………………………………………………………….. 2
1.2 Aim and objectives…………………………………………………………………………………….. 2
1.3 Scope and limitation of the study………………………………………………………………….. 3
CHAPTER TWO…………………………………………………………………………………………….. 4
LITERATURE REVIEW…………………………………………………………………………………. 4
2.0 Introduction……………………………………………………………………………………………… 4
2.1 Historical background of the study area………………………………………………………….. 5
2.2 The concept of modern biometric system……………………………………………………….. 5
2.3 Evolution of modern biometrics……………………………………………………………………. 7
2.4 Technical development……………………………………………………………………………… 10
2.4.0 Classification of biometric……………………………………………………………………. 10
2.4.1 Wayman classifications of biometric………………………………………………………. 12
2.4.2 Key technologies of biometric……………………………………………………………….. 14
2.5 Industry standards……………………………………………………………………………………. 22
2.6 Biometric concerns…………………………………………………………………………………… 23
2.6.0 Informational privacy concerns……………………………………………………………… 24
2.6.1 Physical privacy concern………………………………………………………………………. 25
2.6.2 Religious concerns……………………………………………………………………………… 25
2.7 Performance of biometric………………………………………………………………………….. 25
CHAPTER THREE……………………………………………………………………………………….. 28
METHODOLOGY AND SYSTEM ANALYSIS………………………………………………. 28
3.0 Introduction……………………………………………………………………………………………. 28
3.1 Research methodology……………………………………………………………………………… 28
3.2 Modelling and requirements engineering……………………………………………………… 31
3.2.0 Mapping GRAPPLE and Requirements Engineering…………………………………….. 32
3.2.1 Requirements Management using DOORS……………………………………………….. 35
3.2.2 Defining the Problem Domain……………………………………………………………….. 35
3.3 Requirements engineering in the problem domain………………………………………….. 36
3.3.0 Fingerprint Authentication: Statement of Needs……………………………………….. 36
3.4 Requirements gathering in the problem domain…………………………………………….. 37
3.4.0 Develop Stakeholder Requirements……………………………………………………….. 37
3.4 Analysis of System Requirements………………………………………………………………… 38
3.4.0 System functional Requirements……………………………………………………………. 38
3.4.1 Non-Functional Requirements………………………………………………………………. 39
CHAPTER FOUR…………………………………………………………………………………………. 40
SYSTEM DESIGN, IMPLEMENTATION AND TESTING……………………………… 40
4.0 Introduction……………………………………………………………………………………………. 40
4.1 System design…………………………………………………………………………………………. 40
4.2 System requirements………………………………………………………………………………… 42
4.2.0 Hardware Requirement……………………………………………………………………….. 42
4.2.1 Software Requirement………………………………………………………………………… 42
4.3 User interface design………………………………………………………………………………… 42
4.4 Database design………………………………………………………………………………………. 43
4.5 System operational procedure……………………………………………………………………. 44
4.6 System implementation…………………………………………………………………………….. 48
4.7 Software testing and validation…………………………………………………………………… 48
4.8 System testing…………………………………………………………………………………………. 49
CHAPTER FIVE…………………………………………………………………………………………… 50
SUMMARY CONCLUSION AND RECOMMENDATION……………………………… 50
5.0 Summary……………………………………………………………………………………………….. 50
5.1 Conclusion……………………………………………………………………………………………… 50
5.2 Recommendation…………………………………………………………………………………….. 51
REFERENCES……………………………………………………………………………………………… 52
Appendix A………………………………………………………………………………………………….. 57
Operational screenshots…………………………………………………………………………………. 57
x
CHAPTER ONE
1.0 Introduction
In the context of information systems, a general definition of a biometric system is that of, “A pattern recognition system that recognises a person by determining the authenticity of a specific physiological and/or behavioural characteristic possessed by that person”,(Davide et al 2003). The earliest documented use of systematic biometric methods as a means to distinguish one individual from another can be traced back to 14th century China. Chinese merchants were known to stamp children’s inked palm and footprints on paper in order to tell them apart, (Julian 2004). In western culture, the earliest documented distinction made of a biometric property was that done by the English botanist Nehemiah Grew, who in 1684, published a paper reporting the distinct characteristics of ridge, furrow and pore structures in human fingerprints, (Ibid).
In the intervening years the development of formal scientific method, lead to the first significant application of biometrics by Alphonse Bertillon, a 19th century anthropologist and police clerk. The system, known as Bertillonage, purported to uniquely identify criminals via head and body measurement and other characteristics, such as scars or tattoos, (Ibid). Although flawed, Bertillonage helped to establish biometrics as a valid area of scientific enquiry and subsequent pioneers, such as Sir Francis Galton and Edward Henry further advanced the understanding of fingerprint morphology, (Davide et al 2003). Galton identified the “minutiae features” for fingerprint matching and the Henry system of fingerprint classification meant that by the early 20th century fingerprint recognition had become a standard process in forensics for personal identification, (Ibid).
Throughout the 20th century, advancements in forensic science would eventually lead to the development of Automatic Fingerprint Identification Systems; (AFIS) which became indispensable to law-enforcement agencies worldwide. Today, along with the continued development of AFIS applications, the unprecedented growth of information technologies has seen the emergence of a range of other biometric systems with the potential for a broad based application in both government and commercial IT security.
1.1 Statement of the problems
Taking attendance on a piece of paper is a cumbersome and boring task encountered by the lecturers in computer science and information technology department of Kebbi State University of Science and Technology Aliero due to the large number of population and uncertainty of data and nature of student’s hand writing. After an extensive interview with the acting H.O.D Malan Salisu Umar Suru (the project manager) and some other lecturers in the department on the existing way of taking attendance, I discovered the following problems with the method:
- Some student are taking attendance for their friends
- Lecturers are pacing problems while marking attendance due to lack of good handwriting by some students.
- Some lecturers are showing less concern about whether the students are attending classes or not
- The use of paper to keep the record of attendance is becoming too much expensive
1.2 Aim and objectives
- The overall aim of the study is to follow a proper method of requirements engineering and methodical development to model, design and build a fingerprint recognition system in order to allow logging of student attendance at lectures.
- One of the major objectives of this research is to examine the major biometric technologies of today including, iris, voice, fingerprint, face and hand.
- Understand the key aspects of these major technologies, relating to the technological and application domain.
- Another objective of this research is developing a fingerprint recognition application using an object oriented design approach.
- Investigate the algorithmic structure of such a system and gain insight into how such an application is structured and deployed.
- Consider the wide-scale deployment of biometric technologies, within the context of the five key aspects, in order to better understand tangible benefits and potential hazards in their use.
1.3 Scope and limitation of the study
In any research scope and limitation is very essential, to determine the extend of the study, if the scope is too broad, the research will not be finished on time and if the scope is too narrow, it may not meet the user’s needs.
The proposal pay attention on development of students attendance authentication system, it intended to cover only how to enrols and authenticate users, store the fingerprint sample on the store. The system should comply with security standards for data transfer and maintenance and provide the appropriate mechanisms for handling the range of potential errors conditions that could arise as a result of system operation. The system should also maintain and protect the integrity of user data within the context of system failure and recovery. The application should provide acceptable performance standards in terms of response time and authentication reliability.
This project is limited to the development of student attendance authentication system using fingerprint to allow login of student at lectures.
DISCLAIMER: All project works, files and documents posted on this website, eProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. eProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. The paid subscription on eProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.