According To Suhag (2016), "Fingerprint Based Recognition Systems Have Been Put To
According To Suhag (2016), "Fingerprint Based Recognition Systems Have Been Put To
The fingerprint reader is meant to prevent a student form giving his/her RFID-
card to classmate who attends the lecture, scanning the other student’s RFID-card to
make it appear as if he/she had also attended. When a student enters class, this RFID
reader reads his/her student ID, and his/her finger must press on fingerprint reader.
These RFID tag and fingerprint data send to a PC with a connected RFID-reader and
fingerprint reader. The PC, in turn, sends all the data it has collected to the server
database form Graphical User Interface (GUI). (Thein & Myotun, 2015) [1].
Biometric is a method for uniquely identifying human being based on some
physical characteristic and in this system we will be using the fingerprint. The fingerprint
is an impression left by friction ridges of a human finger. Fingerprint image capturing is
considered to be one the most critical step in an automated authentication system. The
light reflected from the finger passes through the phosphor layer to an array of solid
state pixels which captures a visual image of the fingerprint. A scratched or dirty touch
surface can cause a bad image of the fingerprint. (Ansari et al., 2011) [2].
Minutia Points
According to Suhag (2016), “Fingerprint based recognition systems have been put to
wide use in both forensic and civilian applications. In comparison with other available
biometrics feature matching systems, fingerprint-based biometrics is the most
developed technique and holds the largest market shares. As these systems have been
optimized over the years, not only is it faster than other techniques but the amount of
energy consumed by such systems is also less. Maintaining attendance records of
students of an institution as large as ours is a tedious task. This fingerprint identification
system uses existing techniques in fingerprint recognition and matching”. [3]
Optical Capacitance
According to Subashchandraboss S., (2015), “There are mainly two types of scanning
methods for this technology. Either an optical or capacitance scanner is used to scan and make
a picture of your finger. Though both the methods produce the same type of image, the making
of it is completely different. This scanned image is then compared with an earlier existing finger
print of yours to get the correct identity. The comparison is carried out by the processor and the
comparison is made between the valleys and ridges. Though the steps are simple, very
complex algorithms must be carried out to perform this operation. Though your whole fingerprint
is recorded, the computer takes only parts of the print to compare with other records. Fingerprint
verification is done using extraction of minutiae technique and the system automates the whole
process of taking attendance. For employee fingerprint checking, it checks one fingerprint
template with all templates stored in the database, like wise it checks for all employee which will
take more time”. [5]