report finger software

86
1A-B212-20: ATTENDANCE MANAGEMENT SYSTEM BY USING FINGERPRINT RECOGNITION AHMAD AIZUDDIN BIN MOHD RASHDI 50207111193 BACHELOR OF ENGINEERING TECHNOLOGY (HONS) IN ROBOTICS

Upload: hanif-nayan

Post on 13-May-2017

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: REPORT Finger Software

1A-B212-20: ATTENDANCE MANAGEMENT SYSTEM BY USING FINGERPRINT RECOGNITION

AHMAD AIZUDDIN BIN MOHD RASHDI

50207111193

BACHELOR OF ENGINEERING TECHNOLOGY (HONS) IN ROBOTICS

UNIVERSITI KUALA LUMPUR

JANUARY 2013

Page 2: REPORT Finger Software

DECLARATION PAGE

We declare that this report is our original work and all references have been cited adequately as required by the University.

Date: ____/______/_____ Signature: …………………………….

Full Name: Ahmad Aizuddin Bin

Mohd Rashdi

ID No. : 50207111193

i

Page 3: REPORT Finger Software

APPROVAL PAGE

We have examined this report and verify that it meets the program and University’s requirements for the Bachelor of Engineering Technology in Mechatronics.

Date: ___/______/_____ Signature: …………………………….

Supervisor’s Name:

Mr. Sazly Bin Anuar

Official Stamp:

Date: ___/______/_____ Signature: …………………………….

Co-Supervisor’s Name:

Mdm. Norazlin Binti Ibrahim

Official Stamp:

ii

Page 4: REPORT Finger Software

ACKNOWLEDGEMENT

Thanks to Allah SWT, with his willing gives us the strength and opportunity

to complete this Final Year Project. Firstly, I would like to acknowledge the advice

and guidance of our supervisor Mr. Sazly Bin Anuar. I also thank to our Co-

Supervisor Mdm. Norazlin Binti Ibrahim for their guidance and suggestions. The

major materials for this project, were provided by UniKL MFI and we want to thanks

to UniKL MFI for supporting us. I would like to thank my family members for

supporting and encouraging me to pursue this project. Without my family’s

encouragement, I would not have finished the project.

iii

Page 5: REPORT Finger Software

TABLE OF CONTENTS

Page No.

Title Page

Declaration i

Approval ii

Acknowledgement iii

List of Figures vi

List of Tables vii

Abstract viii

CHAPTER 1: INTRODUCTION............................................................................................1

1.1 INTRODUCTION...................................................................................................1

1.2 BACKGROUND.....................................................................................................1

1.3 PROBLEM STATEMENT......................................................................................3

1.4 OBJECTIVES.........................................................................................................4

1.4.1 To develop the student’s attendance system using Fingerprint Technology....4

1.4.2 To develop software for fingerprint identification and database to store student’s attendance records............................................................................4

1.5 PROJECT SCOPE...................................................................................................5

1.6 PROJECT SIGNIFICANCE....................................................................................6

1.6.1 Faculty.............................................................................................................6

1.6.2 Lecturers..........................................................................................................6

1.6.3 Students...........................................................................................................6

1.7 CONCLUSION.......................................................................................................6

CHAPTER 2: LITERATURE REVIEW.................................................................................7

2.1 INTRODUCTION...................................................................................................7

2.2 BIOMETRICS.........................................................................................................7

2.2.1 IRIS.................................................................................................................8

2.2.2 FACIAL..........................................................................................................9

2.2.3 RETINAL......................................................................................................11

2.2.4 FINGERPRINT.............................................................................................11

2.3 FINGERPRINT AUTHENTICATION.................................................................17

iv

Page 6: REPORT Finger Software

2.4 FINGERPRINT PATTERN..................................................................................18

2.4.1 Arch...............................................................................................................18

2.4.2 Loop..............................................................................................................18

2.4.3 Whorl.............................................................................................................18

2.5 CONCLUSION.....................................................................................................20

CHAPTER 3: RESEARCH METHODOLOGY...................................................................24

3.1 INTRODUCTION.................................................................................................24

3.2 COMPONENT OVERVIEW................................................................................26

3.2.1 PIC16F876A..................................................................................................26

3.2.2 SN-FPR-UART.............................................................................................27

3.2.3 Interface LCD................................................................................................27

3.3 HARDWARE DEVELOPMENT..........................................................................28

3.3.1 Power Supply................................................................................................28

3.2.2 Push Button as Input for PIC microcontroller................................................29

3.3.3 LED as output of PIC microcontroller...........................................................30

3.3.4 Ports for UART interface...............................................................................30

3.4 PROJECT REQUIREMENT.................................................................................33

3.5 CONCLUSION.....................................................................................................34

CHAPTER 4: RESULTS AND DISCUSSION.....................................................................35

4.1 INTRODUCTION.................................................................................................35

4.2 Testing PR29 PCB Board with SN-FPR-UART Fingerprint Reader (Without UC00A).................................................................................................................35

4.3 Testing PR29 PCB board with SN-FPR-UART Fingerprint Reader (With UC00A)36

..............................................................................................................................................37

CHAPTER 5: CONCLUSION AND RECOMMENDATION.........................................39

5.1 CONCLUSION.....................................................................................................39

5.2 RECOMMENDATION.........................................................................................39

REFERENCES.....................................................................................................................40

APPENDIX A: FLOW CHART SEQUENCE OF ATTENDANCE MANAGEMENT SYSTEM BY USING FINGERPRINT RECOGNITION.....................................................41

APPENDIX B: CIRCUIT DIAGRAM..................................................................................51

v

Page 7: REPORT Finger Software

LIST OF FIGURES

Page No.

Figure 1: Fingerprint...............................................................................................................6Figure 2: Iris............................................................................................................................6Figure 3: Facial.......................................................................................................................6Figure 4: Retinal.....................................................................................................................7Figure 5: Arch pattern...........................................................................................................24Figure 6: Loop pattern...........................................................................................................24Figure 7: Whorl pattern.........................................................................................................24Figure 8: Flow of project.......................................................................................................29Figure 9: System Overview...................................................................................................30Figure 10: PIC16F876A........................................................................................................31Figure 11: The way to scan the fingerprint............................................................................32Figure 12: Interface LCD (2 x 16 Characters).......................................................................32Figure 13: Schematic of Power Supply Diagram..................................................................34Figure 14: Schematic of Push Button as input for PIC microcontroller.................................34Figure 15: Schematic of LED as output of PIC microcontroller............................................35Figure 16: Schematic for ports UART interface....................................................................35Figure 17: Soldering iron pin................................................................................................36Figure 18: Fully of PCB board..............................................................................................37Figure 19: Soldering the board..............................................................................................37Figure 20: PCB board with fingerprint reader (without UC00A)..........................................40Figure 21: Illustrations of the connections............................................................................41Figure 22: Connections for PCB-Fingerprint Reader-UC00A...............................................42Figure 23: Illustration of the connection...............................................................................42Figure 24: Fingerprint Reader GUI Panel.............................................................................43Figure 25: Fingerprint Reader GUI export attendance..........................................................43

vi

Page 8: REPORT Finger Software

LIST OF TABLES

Page No.

Table 1: The advantage, disadvantage, and purpose of fingerprint pattern............................24Table 2: Pin Description........................................................................................................32Table 3: List of Component..................................................................................................37

vii

Page 9: REPORT Finger Software

ABSTRACT

This project is about to develop a portable attendance monitoring system based on fingerprint identification that can be used to monitor attendance of student or staff. These projects utilize a portable fingerprint scanner as the input to acquire fingerprint image and the notebook or personal computer as the mobile terminal to process the images and record the attendance. When fingerprint is scan on fingerprint scanner, the fingerprint image will be send data into personal computer. This project is also need to develop a program that has fingerprint recognition and identification function as well as database store student or staff information and attendance records. In the database there will be a lot of information about the fingerprint pattern, fingerprint classification, fingerprint identification, fingerprint reference point and others. All of this match the input fingerprint images with the database.

viii

Page 10: REPORT Finger Software

CHAPTER 1: INTRODUCTION

1.1 INTRODUCTION

This chapter will focus on background of this project, project that cause us to

implement the project, the scope, and significance of the project. The

objectives are also described in detail in this topic.

1.2 BACKGROUND

Biometrics refers to the automatic identification of a person based on his or

her physiological or behavioral characteristics. It includes fingerprint, iris,

facial and retinal. As shown in figure 1, figure 2, figure 3, and figure 4.

Biometrics technologies are becoming the foundation of an extensive array of

highly secure identification and personal verification solutions. Today,

biometric is being spotlighted as the authentication method because of the

need for reliable security.

Fingerprint authentication has been in use for the longest time and bears more

advantages than other biometrics. It has been verified through various

applications. In 1924, Federal Bureau of Investigation (FBI) is already known

to have maintained more than 250 million civil files of fingerprints for the

purpose of criminal investigation and the identification of unknown

casualties. It now is being used in numerous field including financial,

medical, e-commerce and customer application as a secure and effective

authentication method.

1

Page 11: REPORT Finger Software

2

Figure 1.1: Fingerprint

Figure 1.2: Iris

Figure 1.3: Facial

Figure 1.4: Retinal

Figure 1: Fingerprint

Figure 2: Iris

Figure 3: Facial

Figure 4: Retinal

Page 12: REPORT Finger Software

1.3 PROBLEM STATEMENT

Traditionally, student’s attendance is taken manually by using attendance

sheet given by lecturer in class and not a system. With this manual system,

there are some cases that student can cheat by asking their friends to tick or

sign for them. This occurs because the students just want to fulfill the 80% of

the attendance so that they can seat for the final examination at the end of the

semester. Lecturer can’t monitor for all students in the class and it is difficult

for lecturer to record the attendance of students accurately and efficiently.

Lecturers are responsible to monitor the entire student’s attendance for the

whole semester. For those students that fail to meet the 80% of their

attendance rate will be given a reminder as a warning from faculty.

A system may be needed in order to records the attendance of the students

more accurately without have to trace manually by lecturers. A fingerprint

device will be provided at each class and laboratory at the faculty. This

system will record the attendance of students in class when the class begins

and at the end of class. This is to ensure that the students have attended the

class until the lecture ended by the lecturer.

3

Page 13: REPORT Finger Software

1.4 OBJECTIVES

In order to achieve our goal, there are objectives to be followed. The main

objectives of this project are:

1.4.1 To develop the student’s attendance system using Fingerprint Technology

The first objective is to develop the student’s attendance system. This

system will integrate with the fingerprint technology. This system will

record the attendance of the students in class. This system also will

provide the facilities to the faculty to access the information of the

students easily.

1.4.2 To develop software for fingerprint identification and database to store student’s attendance records.

In this project we will develop software to keep the student attendance

data. Student’s attendance data stored in the fingerprint recognition

(hardware) will be transfer into the software developed.

4

Page 14: REPORT Finger Software

1.5 PROJECT SCOPE

Firstly, identify the common problem that all always happen to the attendance

system that is use in UniKL. Then, think a solution for that problem. There

are a few method that can be used to upgrade the attendance system in

UniKL. So, choose the best solution to that problem considering on cost,

effectively of the hardware and how easy to use the system.

After considering the entire factor, choose to use fingerprint method as a

solution to the attendance system problem in UniKL. The main reason

choosing this method because all people have their own unique fingerprint

patents that cannot be copy or same with other people and fingerprint is

always carried by people wherever they go. So that there are no season for

someone to give excuse if there are any problem with their attendance

records.

In overall, scopes of work is to develop a software for fingerprint recognition

and identification as well as database to store student’s information and

attendance records using Visual Basic, net and the software will be integrated

with portable fingerprint scanner to produce a portable attendance monitoring

system.

5

Page 15: REPORT Finger Software

1.6 PROJECT SIGNIFICANCE

The significance must be considered in every proposed system to ensure that

the proposed system will provide more benefit to all parties especially the

faculty. For this project, the significance has been identified. The significance

can be categories into 3 groups. There are:

1.6.1 FacultyThis significance of this system is mainly focusing for the UniKL

itself. This is because this project will enhance the efficiency of the

manual system. It also can reduce in term of paper usage and avoid

human error. All activities are done by computer and technology.

1.6.2 LecturersWith this system, lecturer can record the attendance of their students

in class easily. They also do not have to count the percentage of every

student at the end of the semester.

1.6.3 StudentsAs a user, students can motivate themselves to be more discipline and

punctual.

1.7 CONCLUSION

In this chapter, it is discuss several important sections that related to the

project. All these sections will be a guideline to complete the project

successfully. It includes the explanations about background, problem

statement, scope, objectives and significant of the project.

6

Page 16: REPORT Finger Software

CHAPTER 2: LITERATURE REVIEW

2.1 INTRODUCTION

This chapter will focus on the review of related works. It will introduce the history of the technologies, the definition, the identification and verification, the fingerprint application, summary of biometric methodologies and also factors that cause the fingerprint systems to fail and explained the similar study before.

2.2 BIOMETRICS

According to Bowman, E (2000), biometric technologies are defined as

“automated methods of identifying or authenticating the identity of a living

person based on a physiological or behavioral characteristic”. Automated

methods can be broken down into a mechanism used to scan, a processing or

comparison unit and an interface with a variety of application systems.

Identification refers to when characteristics are selected from a group of stored

images; this produces a list of possible or likely matches.

Authentication refers to the when an individual makes a claim that he or she is

someone specific and just that one person’s characteristics are being checked to

see if they match. Bowman, E, also stated that physiological characteristic is a

physical that does not change frequently such as fingerprint, hand silhouette, iris

pattern or blood vessel pattern on the back of the eye. Behavioral characteristics

are more of a reflection on physiological patterns such as signature, keystroke

analysis and speech patterns.

Biometric recognition or simply biometric refers to the automatics recognition

individuals based on their physiological and/or behavioral characteristics Jain, A

(2004). For example fingerprint, iris, voice. A biometric can be described as a

7

Page 17: REPORT Finger Software

measurable physical and/or behavioral trait that can be captured and used to

verify the identity of a person by computing the metric to a previously stored

template, (Erikson, M, 2001). Biometric can be defined as the task of

automatically recognizing a person using his/her distinguishing traits. The

‘distinguishing traits’ refers to fingerprints, voice pattern, facial characteristics

etc.

2.2.1 IRISIris recognition is an automated method of biometric identification that

uses mathematical pattern-recognition techniques on video images of the

rides of an individual's eyes, whose complex random patterns are unique

and can be seen from some distance.

In 1987 two Ophthalmology Professors, Leonard Flom, M.D. (NYU) and

Aran Safir,M.D.(U.Conn) et al, were issued a first of its kind, broad

patent # 4,641,349 entitled "Iris Recognition Technology." Subsequently,

John Daugman,PhD (Harvard Computer Science faculty) was then

salaried by both ophthalmologists to write the algorithm for their concept

based upon an extensive series of high resolution iris photos supplied to

him by Dr.Flom from his volunteer private patients. Several years later,

Daugman received a method patent for the algorithm and a crudely

constructed prototype proved the concept. The three individuals then

founded "IridianTechnologies,Inc." and assigned the Flom/Safir patent to

that entity that was then capitalized by GE Capital, a branch of

"GE"(General Electric) and other investors.

8

Page 18: REPORT Finger Software

2.2.2 FACIAL

1964-1965

Bledsoe, Helen Chan et al (2000), worked on using the computer to

recognize human faces. He was proud of this work, but because the

funding was provided by an unnamed intelligence agency that did not

allow much publicity, little of the work was published. Given a large

database of images (in effect, a book of mug shots) and a photograph, the

problem was to select from the database a small set of records such that

one of the image records matched the photograph. The success of the

method could be measured in terms of the ratio of the answer list to the

number of records in the database.

1966

After Bledsoe left PRI in 1966, this work was continued at the Stanford

Research Institute, primarily by Peter Hart. In experiments performed on

a database of over 2000 photographs, the computer consistently

outperformed humans when presented with the same recognition tasks

(Bledsoe 1968). Peter Hart (1996) enthusiastically recalled the project

with the exclamation, "It really worked!"

1997

The system developed by Christoph von der Malsburg and graduate

students of the University of Bochum in Germany and the University of

Southern California in the United States outperformed most systems with

those of Massachusetts Institute of Technology and the University of

Maryland rated next. The Bochum system was developed through

funding by the United States Army Research Laboratory. The software

was sold as ZN-Face and used by customers such as Deutsche Bank and

operators of airports and other busy locations. The software was "robust

enough to make identifications from less-than-perfect face views. It can

9

Page 19: REPORT Finger Software

also often see through such impediments to identification as mustaches,

beards, changed hair styles and glasses—even sunglasses".

2007

Image searches were "based on the text surrounding a photo," for

example, if text nearby mentions the image content. Polar Rose

technology can guess from a photograph, in about 1.5 seconds, what any

individual may look like in three dimensions, and thought they "will ask

users to input the names of people they recognize in photos online" to

help build a database Identix, a company out of Minnesota, has developed

the software, FaceIt. FaceIt can pick out someone’s face in a crowd and

compare it to databases worldwide to recognize and put a name to a face.

The software is written to detect multiple features on the human face. I

can detect the distance between the eyes, width of the nose, shape of

cheekbones, length of jawlines and many more facial features. The

software does this by putting the image of the face on a faceprint, a

numerical code that represents the human face. Facial recognition

software used to have to rely on a 2D image with the person almost

directly facing the camera. Now, with FaceIt, a 3D image can be

compared to a 2D image by choosing 3 specific points off of the 3D

image and converting it into a 2D image using a special algorithm that

can be scanned through almost all databases.

10

Page 20: REPORT Finger Software

2.2.3 RETINAL

1935

The idea for retinal identification was first conceived by Dr. Carleton

Simon and Dr. Isadore Goldstein was published in the New York State

Journal of Medicine in 1935. The idea was a little before its time, but

once technology caught up, the concept for a retinal scanning device

emerged in 1975.

1976

In 1976, Robert "Buzz" Hill formed a corporation named EyeDentify, Inc., and made a full-time effort to research and develop such a device. In 1978, specific means for a retinal scanner was patented, followed by a commercial model in 1981.

2.2.4 FINGERPRINT

1686 – Malpighi

In 1686, Marcello Malpighi, a professor of anatomy at the University of

Bologna, noted in his treatise; ridges, spirals and loops in fingerprints. He

made no mention of their value as a tool for individual identification. A

layer of skin was named after him; "Malpighi" layer, which is

approximately 1.8mm thick.

1823 - Purkinji

In 1823, John Evangelist Purkinji, a professor of anatomy at the

University of Breslau, published his thesis discussing 9 fingerprint

patterns, but he too made no mention of the value of fingerprints for

personal identification.

11

Page 21: REPORT Finger Software

1856 - Hershel

The English first began using fingerprints in July of 1858, when Sir

William Herschel, Chief Magistrate of the Hooghly district in Jungipoor,

India, first used fingerprints on native contracts. Sir Herschel's private

conviction that all fingerprints were unique to the individual, as well as

permanent throughout that individual's life, inspired him to expand their

use.

1880 - Faulds

During the 1870's, Dr. Henry Faulds, the British Surgeon- Superintendent

of Tsukiji Hospital in Tokyo, Japan, took up the study of "skin-furrows"

after noticing finger marks on specimens of "prehistoric" pottery. In

1880, Dr. Faulds published an article in the Scientific Journal, "Nature"

(nature). He discussed fingerprints as a means of personal identification,

and the use of printers ink as a method for obtaining such fingerprints.

1882 - Thompson

In 1882, Gilbert Thompson of the U.S. Geological Survey in New

Mexico used his own fingerprints on a document to prevent forgery. This

is the first known use of fingerprints in the United States.

1888 - Galton

Sir Francis Galton, a British anthropologist and a cousin of Charles

Darwin, began his observations of fingerprints as a means of

identification in the 1880's.

1891 - Vucetich

Juan Vucetich, an Argentine Police Official, began the first fingerprint

files based on Galton pattern types. At first, Vucetich included the

Bertillon System with the files.

12

Page 22: REPORT Finger Software

1892 – Vucetich & Galton

Juan Vucetich made the first criminal fingerprint identification in 1892.

Sir Francis Galton published his book, "Fingerprints", establishing the

individuality and permanence of fingerprints. The book included the first

classification system for fingerprints. While he soon discovered that

fingerprints offered no firm clues to an individual's intelligence or genetic

history, he was able to scientifically prove what Herschel and Faulds

already suspected: that fingerprints do not change over the course of an

individual's lifetime, and that no two fingerprints are exactly the same.

According to his calculations, the odds of two individual fingerprints

being the same were 1 in 64 billion. Galton identified the characteristics

by which fingerprints can be identified. These same characteristics

(minutia) are basically still in use today, and are often referred to as

Galton's Details.

1897 – Haque & Bose

On 12th June 1987, the Council of the Governor General of India

approved a committee report that fingerprints should be used for

classification of criminal records. Later that year, the Calcutta (now

Kolkata) Anthropometric Bureau became the world's first Fingerprint

Bureau. Working in the Calcutta Anthropometric Bureau (before it

became the Fingerprint Bureau) were Azizul Haque and Hem Chandra

Bose. Haque and Bose are the two Indian fingerprint experts credited

with primary development of the Henry System of fingerprint

classification (named for their supervisor, Edward Richard Henry). The

Henry classification system is still used in all English-speaking countries.

13

Page 23: REPORT Finger Software

1901 - Henry

Introduction of fingerprints for criminal identification in England and

Wales, using Galton's observations and revised by Sir Edward Richard

Henry.

1902

First systematic use of fingerprints in the U.S. by the New York Civil

Service Commission for testing. Dr. Henry P. DeForrest pioneers U.S.

fingerprinting.

1903

The New York State Prison system began the first systematic use of

fingerprints in U.S. for criminals.

1904

The use of fingerprints began in Leavenworth Federal Penitentiary in

Kansas, and the St. Louis Police Department. They were assisted by a

Sergeant from Scotland Yard who had been on duty at the St. Louis

World's Fair Exposition guarding the British Display. Sometime after the

St. Louis World's Fair, the International Association of Chiefs of Police

(IACP) created America's first national fingerprint repository, called the

National Bureau of Criminal Identification.

1905

U.S. Army begins using fingerprints. U.S. Department of Justice forms

the Bureau of Criminal Identification in Washington, DC to provide a

centralized reference collection of fingerprint cards. Two years later the

U.S. Navy started, and was joined the next year by the Marine Corp.

During the next 25 years more and more law enforcement agencies join

in the use of fingerprints as a means of personal identification. Many of

these agencies began sending copies of their fingerprint cards to the

14

Page 24: REPORT Finger Software

National Bureau of Criminal Identification, which was established by the

International Association of Police Chiefs.

1907

U.S. Navy begins using fingerprints. U.S. Department of Justice's Bureau

of Criminal Identification moves to Leavenworth Federal Penitentiary

where it is staffed at least partially by inmates.

1908

U.S. Marin Corps begins using fingerprints.

1918

Edmond Locard wrote that if 12 points (Galton's Details) were the same

between two fingerprints, it would suffice as a positive identification.

Locard's 12 points seems to have been based on an unscientific

"improvement" over the eleven anthropometric measurements (arm

length, height, etc.) used to "identify" criminals before the adoption of

fingerprints.

1924

In 1924, an act of congress established the Identification Division of the

FBI. The IACP's National Bureau of Criminal Identification and the US

Justice Department's Bureau of Criminal Identification consolidated to

form the nucleus of the FBI fingerprint files.

1946

By 1946, the FBI had processed 100 million fingerprint cards in manually

maintained files and by 1971, 200 million cards. With the introduction of

AFIS technology, the files were split into computerized criminal files and

manually maintained civil files.

15

Page 25: REPORT Finger Software

2005

The FBI’s Integrated AFIS (IAFIS) in Clarksburg, WV has more than 49

million individual computerized fingerprint records for known criminals.

Old paper fingerprint cards for the civil files are still manually maintained

in a warehouse facility (rented shopping center space) in Fairmont, WV,

though most enlisted military service member fingerprint cards received

after 1990, and all military-related fingerprint cards received after 19

May 2000, have now been computerized and can be searched internally

by the FBI. In some future build of IAFIS, the FBI may make such civil

file AFIS searches available to other federal crime laboratories. All US

states and larger cities have their own AFIS databases, each with a subset

of fingerprint records that is not stored in any other database. Thus, law

enforcement fingerprint interface standards are very important to enable

sharing records and mutual searches for identifying criminals.

The history of fingerprints, Source: Moore, G, 2005

16

Page 26: REPORT Finger Software

2.3 FINGERPRINT AUTHENTICATION

According to Prabhakar, Salil and Jain, Anil (n.d), fingerprint-based

identification is the oldest method which has been successfully used in numerous

applications. A fingerprint is made of a series of ridges and furrows on the

surface of the finger. The pattern of ridges and furrows as well as the minutiae

points can determine the uniqueness of a fingerprint. Minutiae points are local

ridge characteristics that occur at either a ridge bifurcation or a ridge ending.

Fingerprinting is the oldest method of successfully matching an identity. A

person’s fingerprints are a complex combination of patterns known as lines,

arches, loops and whorls (Biometric Technology, Inc, 2002). The most

distinctive characteristics are the minutiae, the smallest details found in the ridge

endings. Fingerprints cannot be forged and every individual has a unique print.

Fingerprints have some advantages such as the prints remain the same

throughout a person’s lifetime, the fingerprinting is neither frightening nor

emotionally disturbing and people’s prints are unique. Fingerprints also have

some disadvantages. There are searching through a huge database can be rather

slow, dirt on the finger or injury can blur the print, a fingerprint template is rather

large compared to other biometric devices.

Fingerprints were one of the first biometrics to be adopted and have become

synonymous with reliable personal identification. Among other biometrics

technology, fingerprint has several advantages such as its universality, high

distinctiveness and high performance. In universality, large majority of the

human population has legible fingerprints and can easily be authenticated.

Because of its high distinctiveness, twins who share the same DNA have been

shown to have different fingerprint since the ridge structure on the finger is not

encoded in the genes of an individual. Thus, fingerprints represent a stronger

authentication mechanism than DNA.

17

Page 27: REPORT Finger Software

2.4 FINGERPRINT PATTERN

The analysis of fingerprints for matching purposes generally requires the

comparison of several features of the print pattern. These include patterns, which

are aggregate characteristics of ridges, and minutia points, which are unique

features found within the patterns. It is also necessary to know the structure and

properties of human skin in order to successfully employ some of the imaging

technologies. Scientists have found that family members often share the same

general fingerprint patterns, leading to the belief that these patterns are inherited.

The three basic patterns of fingerprint ridges are the arch, loop, and whorl.

2.4.1 Arch

The ridges enter from one side of the finger, rise in the center forming

and arc, and then exit the other side of the finger as figure 5.

2.4.2 Loop

The ridges enter from one side of a finger, form a curve, and then exit on

that same side as figure 6.

2.4.3 Whorl

Ridges form circularly around a central point on the finger as figure 7.

18

Page 28: REPORT Finger Software

19

Figure 2.1: Arch pattern

Figure 2.2: Loop pattern

Figure 2.1: Arch pattern

Figure 2.2: Loop pattern

Figure 5: Arch pattern

Figure 6: Loop pattern

Figure 7: Whorl pattern

Page 29: REPORT Finger Software

2.5 CONCLUSION

Table 1: The advantage, disadvantage, and purpose of fingerprint pattern

Advantage Disadvantage Purpose

Iris - Very high accuracy

- Verification time is

generally less than 5

seconds

- The eye from a dead

person would

deteriorate too fast

to be useful, so no

extra precautions

have to been taken

with retinal scans to

be sure the user is a

living human being

- Intrusive

- A lot of

memory for the

data to be stored

- Very expensive

- Analyze the features in

the colored tissue

surrounding the pupil

which has more than

200 points that can be

used for comparison,

including rings,

furrows and freckles.

Iris recognition

technology combines

computer vision,

pattern recognition,

statistical inference,

and optics

Retinal - Very high accuracy

- There is no known

way to replicate a

retina

- The eye from a dead

person would

deteriorate too fast

to be useful, so no

extra precautions

have to been taken

with retinal scans to

- Very intrusive

- It has the stigma

of consumer's

thinking it is

potentially

harmful to the

eye

- Comparisons of

template

records can take

upwards of 10

- Retinal scanners are

typically used for

authentication and

identification

purposes. Retinal

scanning has been

utilized by several

government agencies,

prisons, and medical

applications.

20

Page 30: REPORT Finger Software

be sure the user is a

living human being.

seconds,

depending on

the size of the

database.

- Very expensive.

Facial - Non-intrusive

- Cheap technology

- 2D recognition

is affected by

changes in

lighting, the

person’s hair,

the age, and if

the person wear

glasses.

- Requires

camera

equipment for

user

identification;

thus, it is not

likely to

become popular

until most PCs

include cameras

as standard

equipment.

- Commonly used for

security purposes but

are increasingly being

used in a variety of

other applications.

Finger

print

- Very high accuracy. - For some

people it is very

- Used to identify

individuals and verify

21

Page 31: REPORT Finger Software

- Is the most

economical

biometric PC user

authentication

technique.

- it is one of the most

developed

biometrics

- Easy to use.

- Small storage space

required for the

biometric template,

reducing the size of

the database

memory required

- It is standardized.

intrusive,

because is still

related to

criminal

identification.

- It can make

mistakes with

the dryness or

dirty of the

finger’s skin, as

well as with the

age (is not

appropriate with

children,

because the size

of their

fingerprint

changes

quickly).

- Image captured

at 500 dots per

inch (dpi).

Resolution: 8

bits per pixel. A

500 dpi

fingerprint

image at 8 bits

per pixel

demands a large

memory space,

human fingerprints.

22

Page 32: REPORT Finger Software

240 Kbytes

approximately

→ Compression

required (a

factor of 10

approximately)

Table 1 shows the advantage, disadvantage and purpose of fingerprint pattern.

Based on the Table 1, the fingerprint has more advantage between the others it is

one of the developed biometrics and easy to use.

23

Page 33: REPORT Finger Software

CHAPTER 3: RESEARCH METHODOLOGY

3.1 INTRODUCTION

This project is an open source microcontroller. This PIC microcontroller based project designed to develop a fingerprint attendance system using SNFPR- UART fingerprint reader module. This project is able to store numbers of fingerprints and perform matching to mark users’ attendance on selected day. Furthermore, exporting attendance list to text file is also supported by system with the help of Graphical User Interface (GUI) provided. This project will provides hands-on experience in interfacing fingerprint reader with PIC microcontroller through UART (Universal Asynchronous Receiver / Transmitter). On the other hand, also include an extra programmed UART port to interface with PC. Figure 8 show the flow of project and Figure 9 shows the system overview.

24

END

Documentation

Integrate graphical user interface (GUI) and C program with hardware

Build electronic circuits for portable finger print recognize

system.

Develop based graphical user interface (GUI)

START

Figure 8: Flow of project

Page 34: REPORT Finger Software

3.2 COMPONENT OVERVIEW

3.2.1 PIC16F876A

Based on PIC16F876A (Figure 10) are useful in this system because

that powerful (200 nanosecond instruction execution) yet easy-to-

program (only 35 single word instructions) CMOS FLASH-based 8-

bit microcontroller packs Microchip’s powerful PIC® architecture

into a 28-pinpackage and is upwards compatible with the PIC16C5X,

PIC12CSN-FPR-UART and PIC16C7X devices. Feature of the

device:

• 256 bytes of EEPROM data memory

• Self programming

• ICD (In Circuit Debugging function)

• 2 Comparators

• 5 channels of 10-bit Analog-to-Digital (A/D) converter

• 2 capture/compare/PWM functions

• The synchronous serial port can be configured as either 3-wire

Serial Peripheral Interface (SPI™) or the 2-wire Inter-Integrated

Circuit (I²C™) bus

• Universal Asynchronous Receiver Transmitter (USART)

25

LCD Display

LEDS Signal

16F876A

Push Buttons

SN-FPR-UART

Fingerprint Reader

Personal Computer

BUZZER

Figure 3.2: System OverviewFigure 3.2: System OverviewFigure 9: System Overview

Page 35: REPORT Finger Software

3.2.2 SN-FPR-UART

SN-FPR-UART is a compact fingerprint module with built in

memory. The reader featured with direct interface with

microcontroller through UART port and high acquisition/

identification speed. SN-FPR-UART fingerprint reader provides

developers and hobbyists a simple way to include fingerprint reading

feature in this project. Figure 11 shows the correct way to scan the

fingerprint.

3.2.3 Interface LCD

26

Figure 3.3: PIC16F876A

Figure 3.4: The way to scan the fingerprint

Figure 3.3: PIC16F876A

Figure 3.1: The way to scan the fingerprint

Figure 10: PIC16F876A

Figure 11: The way to scan the fingerprint

Page 36: REPORT Finger Software

Figure 12 shows the connections, resistor R8 and R9 (refer table 3.1)

are used to avoid disturbance from RB6 and RB7 when the two pins

used for program the PIC microcontroller.

Table 2: Pin Description

Pi

n

Name Pin Function Connection

1 VSS Ground GND

2 VCC Positive supply for LCD 5V

3 VEE Contrast adjust Connected to a preset

4 RS Select register or data register RC4

5 R/W Select read data or write GND

6 E Start data read or write data RC5

7 DB0 Data bus pin RB0

8 DB1 Data bus pin RB1

9 DB2 Data bus pin RB2

10 DB3 Data bus pin RB3

11 DB4 Data bus pin RB4

12 DB5 Data bus pin RB5

13 DB6 Data bus pin RB6

14 DB7 Data bus pin RB7

15 LED+ Backlight positive input 5V

16 LED- Backlight negative input GND

Table 2 show the name, pin function, and connection of LCD interface. There are 16 pins in LCD interface. This LCD using the 5V for positive supply and also has LED+ backlight positive input and Backlight negative input for LED.

27

Figure 3.5: Interface LCD (2 x 16 Characters)Figure 3.5: Interface LCD (2 x 16 Characters)Figure 11: Interface LCD (2 x 16 Characters)

Page 37: REPORT Finger Software

3.3 HARDWARE DEVELOPMENT

3.3.1 Power Supply

By this project will be choosing either AC to DC adaptor or 9V-12V

to power up the circuit. Higher input voltage will produce more heat

at LM7805 voltage regulator. Typical voltage is 12V. LM7805 will

still generate some heat at 12V. There are two type of power

connector for the circuit, DC plug (J1) and 2510-02 (Power

Connector). Normally AC to DC adaptor can be plugged to J1 type

connector. Refer to Figure 13, the D1 is use to protect the circuit from

wrong polarity supply. C3 and C4 is use to stabilize the voltage at the

input side of the LM7805 voltage regulator, while the C5 and C6 is

use to stabilize the voltage at the output side of the LM7805 voltage

supply. LED is a green LED to indicate the power status of the circuit.

R1 is resistor to protect LED from over current that will burn the

LED.

3.2.2 Push Button as Input for PIC microcontrollerThree I/O pin is needed for three push button as input of PIC

microcontroller. Another push button is use for RESET. The

connection of the push button to the I/O pin is shown in Figure 14.

The I/O pin should be pull up to 5V using a resistor (with value range

1K-10K) and this configuration will result an active-low input. When

the button is being pressed, reading of I/O pin will be in logic 0, while

the button is not pressed, reading of that I/O pin will be logic 1.

28

Figure 3.2: Schematic of Power Supply DiagramFigure 12: Schematic of Power Supply Diagram

Page 38: REPORT Finger Software

3.3.3 LED as output of PIC microcontroller

Three I/O pin is needed for two LEDs and Buzzer as output of PIC

microcontroller. The connections are shown in Figure 15. The I/O pin

should be pull too HIGH in order to on the LEDs and buzzer. The

transistor is used to provide more current for the buzzer.

3.3.4 Ports for UART interface

In this project, there are three ports for UART interface. One port is

connected to the default (internal) UART pins in PIC microcontroller

which are RC6 and RC7. Another two ports are connected to 4 I/O

pins of PIC microcontroller. Resistor connected to each of TX and RX

pin to avoid signal disturbance. Figure 16 shows the connections.

29

Figure 3.7: Schematic of Push Button as input for PIC microcontroller

Figure 3.3: Schematic of LED as output of PIC microcontroller

Figure 13: Schematic of Push Button as input for PIC microcontroller

Figure 15: Schematic of LED as output of PIC microcontroller

Page 39: REPORT Finger Software

3.3.5 Soldering process

3.3.5.1 Soldering Iron Pin

Soldering process has start by solder the electronic

components one by one according the symbols and overlays

on the Printed Circuit Board (PCB). Ensure the component

value and polarity is correctly soldered. The polarity electronic

component such as capacitor, diode, PIC, buzzer, and LED

should be soldered in right polarity on the circuit board. Figure

17 shows the soldering the iron pin.

30

Figure 3.9: Schematic of ports for UART interface

Figure 15: Soldering iron pin

Page 40: REPORT Finger Software

3.3.5.2 Soldering the board

Based on the Figure 18, it is shows the entire component requirement that need to soldering on the board. The require components are:

o Reset button (to reset the microcontroller).

o Push button.

o UIC00A box header (connect to UIC00A/B programmer to

load program).

o 2510-02 connector (power connector).

o 2510-04 connector (UART connector).

o Parallel LCD 2x16.

o Preset (adjust contrast of LCD display).

o Crystal (20MHz).

o 9. LEDs 3mm.

o PIC16F876A.

o Buzzer.

o Slide switch (to ON or OFF the circuit).

13. LM7805 (+5V Regulator)

The result shows in Figure 19.

31

Figure 3.11: Fully of PCB boardFigure 16: Fully of PCB board

Page 41: REPORT Finger Software

3.4 PROJECT REQUIREMENT

Table 3: List of Component

No Component Product Code Quantity

1 IC PIC16F876A IC-PIC-16F876A 1

2 IC Socket-28 pin(slim) IS-28PIN(S) 1

3 Crystal H49S (Low Profile) 20MHz CR-H49S-20M 1

4 Voltage Regulator +5V VR-7805 1

5 Diode 1N4007 DI-1N4007 1

6 Diode 1N4148 DI-1N4148 1

7 Electrolytic Capacitor 16V 47uF CP-EC-16-47UF 2

8 Multilayer Capacitor 0.1uF CP-CC-0.1UF 6

9 Ceramic Capacitor 30pF CP-CC-30PF 2

10 Resistor 1/4W 330R RS-025W-330R 3

11 Resistor 1/4W 10K RS-025W-10K 4

12 Resistor 1/4W 1K RS-025W-1K 3

13 LED 3mm Green DS-LED-3NG 1

14 LED 3mm Yellow DS-LED-3NY 1

15 LED 3mm Orange DS-LED-3NO 1

16 PCB for PR27 PCB-PR-027 1

17 2510 PCB Connector 4 Ways CN-04-2510 3

18 Slide switch 3 pins (Black) SW-SL-3N-061206 1

19 DC Plug (Adaptor Socket) CN-HL-2527-B 1

20 6x6x1 Push Button 2 Pins SW-PBM-2N-060601 4

21 Buzzer-PCB Mount SO-BUZZ-PCB 1

32

Page 42: REPORT Finger Software

22 Preset 5K RS-RM-065-5K 1

23 Transistor 2N2222 TR-2N-2222 1

24 10 Ways Straight Box Header CN-IDC-BOX-10 1

25 LCD (16x2) DS-LCD-JHD162A 1

26 Straight Pin Header(Male) 16 Ways CN-PH-M140S 1

27 Straight Pin Header(Male) 2 Ways CN-PH-M140S 3

28 Mini Jumper CN-PH-MJ 3

29 2510 PCB Connector 2 Ways CN-02-2510 1

30 Bolt M3x6mm HD-PM-M3-6 4

31 M3 Nut HD-PM-M3-NUT 4

32 Fingerprint Reader module SN-FPR-UART 1

Optional

33 UIC00A Programmer UIC00A Programmer 1

34 AC to DC adaptor AC to DC adaptor 1

35 UC00A USB to UART Converter

UC00A USB to

UART Converter 1

Table 3 shows the component/part/hardware that was used to complete the project. RM538 were used to purchase the entire item.

3.5 CONCLUSION

In conclusion, two method were used in assemble to the component, using the battery and USB. The coding was based on combination of MPLAB. The complete system is able to work properly without any problem but the testing is yet to come on the next chapter

33

Page 43: REPORT Finger Software

34

Page 44: REPORT Finger Software

CHAPTER 4: RESULTS AND DISCUSSION

4.1 INTRODUCTION

This chapter covers the testing and result. The testing was done in two situations, by using the battery and USB. Both of the result is explained in each sub topic.

4.2 Testing PR29 PCB Board with SN-FPR-UART Fingerprint Reader (Without UC00A)

After completing installation and soldering of electronic components on a

circuit, attempts were made to use the 9V battery to turn on the PCB board. It

is without using UCU00A.

Using a battery as the source, the user can save the data by placing a finger on

the fingerprint reader. At start-up, it will display on the LCD are two options

it is admin and user. Admin should be set first as admin because admin can

manage the system with options provided in Admin mode. Users are only

allowed to use the system attendance to record the attendance. The figure 20

shows the PCB board with fingerprint reader without UC00A.

35Figure 4.1: PCB board with fingerprint reader (without UC00A)

Figure 18: PCB board with fingerprint reader (without UC00A)

Page 45: REPORT Finger Software

The result shows successfully with the battery 9V as input.

4.3 Testing PR29 PCB board with SN-FPR-UART Fingerprint Reader (With UC00A)

Being hardware installation is set up correctly. UART connection used to

connect to a PC serial port. UC00A's drivers must be installed in the

computer. After UC00A connected to the USB port, the TX of PCBs has to

connect TX RX of UC00A of UC00A while connected to RX of PCBs as

Figure 22.

Fingerprint reader GUI used to export attendance list to personal computers.

Fingerprint reader GUI has been developed by using Microsoft Visual Basic

software as shown in Figure 24. Communication port is set to the largest

number after the driver installation. Baud rate used is 19200. There are two

options on the target device "interface with PR29" and "interface with

Reader". Interface with PR29 used to export attendance from the system as

shown in Figure 25.

36

Figure 19: Illustrations of the connections

Page 46: REPORT Finger Software

37

Figure 20: Connections for PCB-Fingerprint Reader-UC00A

Figure 21: Illustration of the connection

Page 47: REPORT Finger Software

38

Figure 22: Fingerprint Reader GUI Panel

Figure 23: Fingerprint Reader GUI export attendance

Page 48: REPORT Finger Software

CHAPTER 5: CONCLUSION AND RECOMMENDATION

5.1 CONCLUSION

This project mainly comprised of development of attendance management

system and fingerprint identification system. Attendance management is very

helpful in saving valuable time of students and teachers, paper and generating

report at required time. The system successfully took the attendance both at

lectures and examinations as discuss in Chapter 4. The project successfully

captured new fingerprints to be stored in the database; scanned fingerprints

placed on the device sensor and compared those stored in the database

successfully. The result of the system was acceptable and would be

considered for full implementation especially because of its short execution

time and reports generation.

5.2 RECOMMENDATION

The following suggestions should be considered in carrying out further work

on this study:

The system can be linked with the Unikl MFI Campus central

database so that the student registration phase can be eliminated and

the bio-data can be directly from the database.

The university should acquire the fingerprints of all students at

admission.

The components could be chosen and assembled in a commercialized

manner: instead of a stand-alone fingerprint scanner and a laptop, the

unit could have the fingerprint scanner, a small LCD screen and a

keypad all attached to the wall of each classroom.

39

Page 49: REPORT Finger Software

REFERENCES

R. Heidn. A world history of fingerprint, Chinese People Public

Security University Press. 2008.

Neeta Nain, Deepak B M, Dinesh Kumar, ManishaBaswal, and Biju

Gautham. Optimized Minutiae–Based Fingerprint Matching, Proceedings.

2008.

Stephan huckemann,Thonmas Hotz, and Axel Munk, Global Models

for the Orientation Field of Fingerprints: An Approach Based on Quadratic

Differentials, IEEE Transactions. 2008.

40

Page 50: REPORT Finger Software

APPENDIX A: FLOW CHART SEQUENCE OF ATTENDANCE MANAGEMENT SYSTEM BY USING

FINGERPRINT RECOGNITION

41

Page 51: REPORT Finger Software

42

Page 52: REPORT Finger Software

MODE 1 OPERATION: SET DAY

43

Page 53: REPORT Finger Software

MODE 2 OPERATION: ADD NEW DATA

44

Page 54: REPORT Finger Software

MODE 3 OPERATION: DELETE A DATA

45

Page 55: REPORT Finger Software

MODE 4 OPERATION: DELETE ALL DATA

46

Page 56: REPORT Finger Software

MODE 5 OPERATION: CHANGE ADMIN

47

Page 57: REPORT Finger Software

MODE 6 OPERATION: VIEW ATTENTAND

MODE 7 OPERATION: VIEW ATTENDANCE

MODE 8 OPERATION: EXPORT

48

Page 58: REPORT Finger Software

9: RESET ADMIN FLOW

10. ADD NEW FINGERPRINT TO USER SELECTED/ADMIN

49

Page 59: REPORT Finger Software

50

Page 60: REPORT Finger Software

APPENDIX B: CIRCUIT DIAGRAM

51

Figure 1: Microcontroller

Figure 2: Crystal 20MHz

Page 61: REPORT Finger Software

52

Figure 3: ICSP PROGRAMMER