report finger software
TRANSCRIPT
1A-B212-20: ATTENDANCE MANAGEMENT SYSTEM BY USING FINGERPRINT RECOGNITION
AHMAD AIZUDDIN BIN MOHD RASHDI
50207111193
BACHELOR OF ENGINEERING TECHNOLOGY (HONS) IN ROBOTICS
UNIVERSITI KUALA LUMPUR
JANUARY 2013
DECLARATION PAGE
We declare that this report is our original work and all references have been cited adequately as required by the University.
Date: ____/______/_____ Signature: …………………………….
Full Name: Ahmad Aizuddin Bin
Mohd Rashdi
ID No. : 50207111193
i
APPROVAL PAGE
We have examined this report and verify that it meets the program and University’s requirements for the Bachelor of Engineering Technology in Mechatronics.
Date: ___/______/_____ Signature: …………………………….
Supervisor’s Name:
Mr. Sazly Bin Anuar
Official Stamp:
Date: ___/______/_____ Signature: …………………………….
Co-Supervisor’s Name:
Mdm. Norazlin Binti Ibrahim
Official Stamp:
ii
ACKNOWLEDGEMENT
Thanks to Allah SWT, with his willing gives us the strength and opportunity
to complete this Final Year Project. Firstly, I would like to acknowledge the advice
and guidance of our supervisor Mr. Sazly Bin Anuar. I also thank to our Co-
Supervisor Mdm. Norazlin Binti Ibrahim for their guidance and suggestions. The
major materials for this project, were provided by UniKL MFI and we want to thanks
to UniKL MFI for supporting us. I would like to thank my family members for
supporting and encouraging me to pursue this project. Without my family’s
encouragement, I would not have finished the project.
iii
TABLE OF CONTENTS
Page No.
Title Page
Declaration i
Approval ii
Acknowledgement iii
List of Figures vi
List of Tables vii
Abstract viii
CHAPTER 1: INTRODUCTION............................................................................................1
1.1 INTRODUCTION...................................................................................................1
1.2 BACKGROUND.....................................................................................................1
1.3 PROBLEM STATEMENT......................................................................................3
1.4 OBJECTIVES.........................................................................................................4
1.4.1 To develop the student’s attendance system using Fingerprint Technology....4
1.4.2 To develop software for fingerprint identification and database to store student’s attendance records............................................................................4
1.5 PROJECT SCOPE...................................................................................................5
1.6 PROJECT SIGNIFICANCE....................................................................................6
1.6.1 Faculty.............................................................................................................6
1.6.2 Lecturers..........................................................................................................6
1.6.3 Students...........................................................................................................6
1.7 CONCLUSION.......................................................................................................6
CHAPTER 2: LITERATURE REVIEW.................................................................................7
2.1 INTRODUCTION...................................................................................................7
2.2 BIOMETRICS.........................................................................................................7
2.2.1 IRIS.................................................................................................................8
2.2.2 FACIAL..........................................................................................................9
2.2.3 RETINAL......................................................................................................11
2.2.4 FINGERPRINT.............................................................................................11
2.3 FINGERPRINT AUTHENTICATION.................................................................17
iv
2.4 FINGERPRINT PATTERN..................................................................................18
2.4.1 Arch...............................................................................................................18
2.4.2 Loop..............................................................................................................18
2.4.3 Whorl.............................................................................................................18
2.5 CONCLUSION.....................................................................................................20
CHAPTER 3: RESEARCH METHODOLOGY...................................................................24
3.1 INTRODUCTION.................................................................................................24
3.2 COMPONENT OVERVIEW................................................................................26
3.2.1 PIC16F876A..................................................................................................26
3.2.2 SN-FPR-UART.............................................................................................27
3.2.3 Interface LCD................................................................................................27
3.3 HARDWARE DEVELOPMENT..........................................................................28
3.3.1 Power Supply................................................................................................28
3.2.2 Push Button as Input for PIC microcontroller................................................29
3.3.3 LED as output of PIC microcontroller...........................................................30
3.3.4 Ports for UART interface...............................................................................30
3.4 PROJECT REQUIREMENT.................................................................................33
3.5 CONCLUSION.....................................................................................................34
CHAPTER 4: RESULTS AND DISCUSSION.....................................................................35
4.1 INTRODUCTION.................................................................................................35
4.2 Testing PR29 PCB Board with SN-FPR-UART Fingerprint Reader (Without UC00A).................................................................................................................35
4.3 Testing PR29 PCB board with SN-FPR-UART Fingerprint Reader (With UC00A)36
..............................................................................................................................................37
CHAPTER 5: CONCLUSION AND RECOMMENDATION.........................................39
5.1 CONCLUSION.....................................................................................................39
5.2 RECOMMENDATION.........................................................................................39
REFERENCES.....................................................................................................................40
APPENDIX A: FLOW CHART SEQUENCE OF ATTENDANCE MANAGEMENT SYSTEM BY USING FINGERPRINT RECOGNITION.....................................................41
APPENDIX B: CIRCUIT DIAGRAM..................................................................................51
v
LIST OF FIGURES
Page No.
Figure 1: Fingerprint...............................................................................................................6Figure 2: Iris............................................................................................................................6Figure 3: Facial.......................................................................................................................6Figure 4: Retinal.....................................................................................................................7Figure 5: Arch pattern...........................................................................................................24Figure 6: Loop pattern...........................................................................................................24Figure 7: Whorl pattern.........................................................................................................24Figure 8: Flow of project.......................................................................................................29Figure 9: System Overview...................................................................................................30Figure 10: PIC16F876A........................................................................................................31Figure 11: The way to scan the fingerprint............................................................................32Figure 12: Interface LCD (2 x 16 Characters).......................................................................32Figure 13: Schematic of Power Supply Diagram..................................................................34Figure 14: Schematic of Push Button as input for PIC microcontroller.................................34Figure 15: Schematic of LED as output of PIC microcontroller............................................35Figure 16: Schematic for ports UART interface....................................................................35Figure 17: Soldering iron pin................................................................................................36Figure 18: Fully of PCB board..............................................................................................37Figure 19: Soldering the board..............................................................................................37Figure 20: PCB board with fingerprint reader (without UC00A)..........................................40Figure 21: Illustrations of the connections............................................................................41Figure 22: Connections for PCB-Fingerprint Reader-UC00A...............................................42Figure 23: Illustration of the connection...............................................................................42Figure 24: Fingerprint Reader GUI Panel.............................................................................43Figure 25: Fingerprint Reader GUI export attendance..........................................................43
vi
LIST OF TABLES
Page No.
Table 1: The advantage, disadvantage, and purpose of fingerprint pattern............................24Table 2: Pin Description........................................................................................................32Table 3: List of Component..................................................................................................37
vii
ABSTRACT
This project is about to develop a portable attendance monitoring system based on fingerprint identification that can be used to monitor attendance of student or staff. These projects utilize a portable fingerprint scanner as the input to acquire fingerprint image and the notebook or personal computer as the mobile terminal to process the images and record the attendance. When fingerprint is scan on fingerprint scanner, the fingerprint image will be send data into personal computer. This project is also need to develop a program that has fingerprint recognition and identification function as well as database store student or staff information and attendance records. In the database there will be a lot of information about the fingerprint pattern, fingerprint classification, fingerprint identification, fingerprint reference point and others. All of this match the input fingerprint images with the database.
viii
CHAPTER 1: INTRODUCTION
1.1 INTRODUCTION
This chapter will focus on background of this project, project that cause us to
implement the project, the scope, and significance of the project. The
objectives are also described in detail in this topic.
1.2 BACKGROUND
Biometrics refers to the automatic identification of a person based on his or
her physiological or behavioral characteristics. It includes fingerprint, iris,
facial and retinal. As shown in figure 1, figure 2, figure 3, and figure 4.
Biometrics technologies are becoming the foundation of an extensive array of
highly secure identification and personal verification solutions. Today,
biometric is being spotlighted as the authentication method because of the
need for reliable security.
Fingerprint authentication has been in use for the longest time and bears more
advantages than other biometrics. It has been verified through various
applications. In 1924, Federal Bureau of Investigation (FBI) is already known
to have maintained more than 250 million civil files of fingerprints for the
purpose of criminal investigation and the identification of unknown
casualties. It now is being used in numerous field including financial,
medical, e-commerce and customer application as a secure and effective
authentication method.
1
2
Figure 1.1: Fingerprint
Figure 1.2: Iris
Figure 1.3: Facial
Figure 1.4: Retinal
Figure 1: Fingerprint
Figure 2: Iris
Figure 3: Facial
Figure 4: Retinal
1.3 PROBLEM STATEMENT
Traditionally, student’s attendance is taken manually by using attendance
sheet given by lecturer in class and not a system. With this manual system,
there are some cases that student can cheat by asking their friends to tick or
sign for them. This occurs because the students just want to fulfill the 80% of
the attendance so that they can seat for the final examination at the end of the
semester. Lecturer can’t monitor for all students in the class and it is difficult
for lecturer to record the attendance of students accurately and efficiently.
Lecturers are responsible to monitor the entire student’s attendance for the
whole semester. For those students that fail to meet the 80% of their
attendance rate will be given a reminder as a warning from faculty.
A system may be needed in order to records the attendance of the students
more accurately without have to trace manually by lecturers. A fingerprint
device will be provided at each class and laboratory at the faculty. This
system will record the attendance of students in class when the class begins
and at the end of class. This is to ensure that the students have attended the
class until the lecture ended by the lecturer.
3
1.4 OBJECTIVES
In order to achieve our goal, there are objectives to be followed. The main
objectives of this project are:
1.4.1 To develop the student’s attendance system using Fingerprint Technology
The first objective is to develop the student’s attendance system. This
system will integrate with the fingerprint technology. This system will
record the attendance of the students in class. This system also will
provide the facilities to the faculty to access the information of the
students easily.
1.4.2 To develop software for fingerprint identification and database to store student’s attendance records.
In this project we will develop software to keep the student attendance
data. Student’s attendance data stored in the fingerprint recognition
(hardware) will be transfer into the software developed.
4
1.5 PROJECT SCOPE
Firstly, identify the common problem that all always happen to the attendance
system that is use in UniKL. Then, think a solution for that problem. There
are a few method that can be used to upgrade the attendance system in
UniKL. So, choose the best solution to that problem considering on cost,
effectively of the hardware and how easy to use the system.
After considering the entire factor, choose to use fingerprint method as a
solution to the attendance system problem in UniKL. The main reason
choosing this method because all people have their own unique fingerprint
patents that cannot be copy or same with other people and fingerprint is
always carried by people wherever they go. So that there are no season for
someone to give excuse if there are any problem with their attendance
records.
In overall, scopes of work is to develop a software for fingerprint recognition
and identification as well as database to store student’s information and
attendance records using Visual Basic, net and the software will be integrated
with portable fingerprint scanner to produce a portable attendance monitoring
system.
5
1.6 PROJECT SIGNIFICANCE
The significance must be considered in every proposed system to ensure that
the proposed system will provide more benefit to all parties especially the
faculty. For this project, the significance has been identified. The significance
can be categories into 3 groups. There are:
1.6.1 FacultyThis significance of this system is mainly focusing for the UniKL
itself. This is because this project will enhance the efficiency of the
manual system. It also can reduce in term of paper usage and avoid
human error. All activities are done by computer and technology.
1.6.2 LecturersWith this system, lecturer can record the attendance of their students
in class easily. They also do not have to count the percentage of every
student at the end of the semester.
1.6.3 StudentsAs a user, students can motivate themselves to be more discipline and
punctual.
1.7 CONCLUSION
In this chapter, it is discuss several important sections that related to the
project. All these sections will be a guideline to complete the project
successfully. It includes the explanations about background, problem
statement, scope, objectives and significant of the project.
6
CHAPTER 2: LITERATURE REVIEW
2.1 INTRODUCTION
This chapter will focus on the review of related works. It will introduce the history of the technologies, the definition, the identification and verification, the fingerprint application, summary of biometric methodologies and also factors that cause the fingerprint systems to fail and explained the similar study before.
2.2 BIOMETRICS
According to Bowman, E (2000), biometric technologies are defined as
“automated methods of identifying or authenticating the identity of a living
person based on a physiological or behavioral characteristic”. Automated
methods can be broken down into a mechanism used to scan, a processing or
comparison unit and an interface with a variety of application systems.
Identification refers to when characteristics are selected from a group of stored
images; this produces a list of possible or likely matches.
Authentication refers to the when an individual makes a claim that he or she is
someone specific and just that one person’s characteristics are being checked to
see if they match. Bowman, E, also stated that physiological characteristic is a
physical that does not change frequently such as fingerprint, hand silhouette, iris
pattern or blood vessel pattern on the back of the eye. Behavioral characteristics
are more of a reflection on physiological patterns such as signature, keystroke
analysis and speech patterns.
Biometric recognition or simply biometric refers to the automatics recognition
individuals based on their physiological and/or behavioral characteristics Jain, A
(2004). For example fingerprint, iris, voice. A biometric can be described as a
7
measurable physical and/or behavioral trait that can be captured and used to
verify the identity of a person by computing the metric to a previously stored
template, (Erikson, M, 2001). Biometric can be defined as the task of
automatically recognizing a person using his/her distinguishing traits. The
‘distinguishing traits’ refers to fingerprints, voice pattern, facial characteristics
etc.
2.2.1 IRISIris recognition is an automated method of biometric identification that
uses mathematical pattern-recognition techniques on video images of the
rides of an individual's eyes, whose complex random patterns are unique
and can be seen from some distance.
In 1987 two Ophthalmology Professors, Leonard Flom, M.D. (NYU) and
Aran Safir,M.D.(U.Conn) et al, were issued a first of its kind, broad
patent # 4,641,349 entitled "Iris Recognition Technology." Subsequently,
John Daugman,PhD (Harvard Computer Science faculty) was then
salaried by both ophthalmologists to write the algorithm for their concept
based upon an extensive series of high resolution iris photos supplied to
him by Dr.Flom from his volunteer private patients. Several years later,
Daugman received a method patent for the algorithm and a crudely
constructed prototype proved the concept. The three individuals then
founded "IridianTechnologies,Inc." and assigned the Flom/Safir patent to
that entity that was then capitalized by GE Capital, a branch of
"GE"(General Electric) and other investors.
8
2.2.2 FACIAL
1964-1965
Bledsoe, Helen Chan et al (2000), worked on using the computer to
recognize human faces. He was proud of this work, but because the
funding was provided by an unnamed intelligence agency that did not
allow much publicity, little of the work was published. Given a large
database of images (in effect, a book of mug shots) and a photograph, the
problem was to select from the database a small set of records such that
one of the image records matched the photograph. The success of the
method could be measured in terms of the ratio of the answer list to the
number of records in the database.
1966
After Bledsoe left PRI in 1966, this work was continued at the Stanford
Research Institute, primarily by Peter Hart. In experiments performed on
a database of over 2000 photographs, the computer consistently
outperformed humans when presented with the same recognition tasks
(Bledsoe 1968). Peter Hart (1996) enthusiastically recalled the project
with the exclamation, "It really worked!"
1997
The system developed by Christoph von der Malsburg and graduate
students of the University of Bochum in Germany and the University of
Southern California in the United States outperformed most systems with
those of Massachusetts Institute of Technology and the University of
Maryland rated next. The Bochum system was developed through
funding by the United States Army Research Laboratory. The software
was sold as ZN-Face and used by customers such as Deutsche Bank and
operators of airports and other busy locations. The software was "robust
enough to make identifications from less-than-perfect face views. It can
9
also often see through such impediments to identification as mustaches,
beards, changed hair styles and glasses—even sunglasses".
2007
Image searches were "based on the text surrounding a photo," for
example, if text nearby mentions the image content. Polar Rose
technology can guess from a photograph, in about 1.5 seconds, what any
individual may look like in three dimensions, and thought they "will ask
users to input the names of people they recognize in photos online" to
help build a database Identix, a company out of Minnesota, has developed
the software, FaceIt. FaceIt can pick out someone’s face in a crowd and
compare it to databases worldwide to recognize and put a name to a face.
The software is written to detect multiple features on the human face. I
can detect the distance between the eyes, width of the nose, shape of
cheekbones, length of jawlines and many more facial features. The
software does this by putting the image of the face on a faceprint, a
numerical code that represents the human face. Facial recognition
software used to have to rely on a 2D image with the person almost
directly facing the camera. Now, with FaceIt, a 3D image can be
compared to a 2D image by choosing 3 specific points off of the 3D
image and converting it into a 2D image using a special algorithm that
can be scanned through almost all databases.
10
2.2.3 RETINAL
1935
The idea for retinal identification was first conceived by Dr. Carleton
Simon and Dr. Isadore Goldstein was published in the New York State
Journal of Medicine in 1935. The idea was a little before its time, but
once technology caught up, the concept for a retinal scanning device
emerged in 1975.
1976
In 1976, Robert "Buzz" Hill formed a corporation named EyeDentify, Inc., and made a full-time effort to research and develop such a device. In 1978, specific means for a retinal scanner was patented, followed by a commercial model in 1981.
2.2.4 FINGERPRINT
1686 – Malpighi
In 1686, Marcello Malpighi, a professor of anatomy at the University of
Bologna, noted in his treatise; ridges, spirals and loops in fingerprints. He
made no mention of their value as a tool for individual identification. A
layer of skin was named after him; "Malpighi" layer, which is
approximately 1.8mm thick.
1823 - Purkinji
In 1823, John Evangelist Purkinji, a professor of anatomy at the
University of Breslau, published his thesis discussing 9 fingerprint
patterns, but he too made no mention of the value of fingerprints for
personal identification.
11
1856 - Hershel
The English first began using fingerprints in July of 1858, when Sir
William Herschel, Chief Magistrate of the Hooghly district in Jungipoor,
India, first used fingerprints on native contracts. Sir Herschel's private
conviction that all fingerprints were unique to the individual, as well as
permanent throughout that individual's life, inspired him to expand their
use.
1880 - Faulds
During the 1870's, Dr. Henry Faulds, the British Surgeon- Superintendent
of Tsukiji Hospital in Tokyo, Japan, took up the study of "skin-furrows"
after noticing finger marks on specimens of "prehistoric" pottery. In
1880, Dr. Faulds published an article in the Scientific Journal, "Nature"
(nature). He discussed fingerprints as a means of personal identification,
and the use of printers ink as a method for obtaining such fingerprints.
1882 - Thompson
In 1882, Gilbert Thompson of the U.S. Geological Survey in New
Mexico used his own fingerprints on a document to prevent forgery. This
is the first known use of fingerprints in the United States.
1888 - Galton
Sir Francis Galton, a British anthropologist and a cousin of Charles
Darwin, began his observations of fingerprints as a means of
identification in the 1880's.
1891 - Vucetich
Juan Vucetich, an Argentine Police Official, began the first fingerprint
files based on Galton pattern types. At first, Vucetich included the
Bertillon System with the files.
12
1892 – Vucetich & Galton
Juan Vucetich made the first criminal fingerprint identification in 1892.
Sir Francis Galton published his book, "Fingerprints", establishing the
individuality and permanence of fingerprints. The book included the first
classification system for fingerprints. While he soon discovered that
fingerprints offered no firm clues to an individual's intelligence or genetic
history, he was able to scientifically prove what Herschel and Faulds
already suspected: that fingerprints do not change over the course of an
individual's lifetime, and that no two fingerprints are exactly the same.
According to his calculations, the odds of two individual fingerprints
being the same were 1 in 64 billion. Galton identified the characteristics
by which fingerprints can be identified. These same characteristics
(minutia) are basically still in use today, and are often referred to as
Galton's Details.
1897 – Haque & Bose
On 12th June 1987, the Council of the Governor General of India
approved a committee report that fingerprints should be used for
classification of criminal records. Later that year, the Calcutta (now
Kolkata) Anthropometric Bureau became the world's first Fingerprint
Bureau. Working in the Calcutta Anthropometric Bureau (before it
became the Fingerprint Bureau) were Azizul Haque and Hem Chandra
Bose. Haque and Bose are the two Indian fingerprint experts credited
with primary development of the Henry System of fingerprint
classification (named for their supervisor, Edward Richard Henry). The
Henry classification system is still used in all English-speaking countries.
13
1901 - Henry
Introduction of fingerprints for criminal identification in England and
Wales, using Galton's observations and revised by Sir Edward Richard
Henry.
1902
First systematic use of fingerprints in the U.S. by the New York Civil
Service Commission for testing. Dr. Henry P. DeForrest pioneers U.S.
fingerprinting.
1903
The New York State Prison system began the first systematic use of
fingerprints in U.S. for criminals.
1904
The use of fingerprints began in Leavenworth Federal Penitentiary in
Kansas, and the St. Louis Police Department. They were assisted by a
Sergeant from Scotland Yard who had been on duty at the St. Louis
World's Fair Exposition guarding the British Display. Sometime after the
St. Louis World's Fair, the International Association of Chiefs of Police
(IACP) created America's first national fingerprint repository, called the
National Bureau of Criminal Identification.
1905
U.S. Army begins using fingerprints. U.S. Department of Justice forms
the Bureau of Criminal Identification in Washington, DC to provide a
centralized reference collection of fingerprint cards. Two years later the
U.S. Navy started, and was joined the next year by the Marine Corp.
During the next 25 years more and more law enforcement agencies join
in the use of fingerprints as a means of personal identification. Many of
these agencies began sending copies of their fingerprint cards to the
14
National Bureau of Criminal Identification, which was established by the
International Association of Police Chiefs.
1907
U.S. Navy begins using fingerprints. U.S. Department of Justice's Bureau
of Criminal Identification moves to Leavenworth Federal Penitentiary
where it is staffed at least partially by inmates.
1908
U.S. Marin Corps begins using fingerprints.
1918
Edmond Locard wrote that if 12 points (Galton's Details) were the same
between two fingerprints, it would suffice as a positive identification.
Locard's 12 points seems to have been based on an unscientific
"improvement" over the eleven anthropometric measurements (arm
length, height, etc.) used to "identify" criminals before the adoption of
fingerprints.
1924
In 1924, an act of congress established the Identification Division of the
FBI. The IACP's National Bureau of Criminal Identification and the US
Justice Department's Bureau of Criminal Identification consolidated to
form the nucleus of the FBI fingerprint files.
1946
By 1946, the FBI had processed 100 million fingerprint cards in manually
maintained files and by 1971, 200 million cards. With the introduction of
AFIS technology, the files were split into computerized criminal files and
manually maintained civil files.
15
2005
The FBI’s Integrated AFIS (IAFIS) in Clarksburg, WV has more than 49
million individual computerized fingerprint records for known criminals.
Old paper fingerprint cards for the civil files are still manually maintained
in a warehouse facility (rented shopping center space) in Fairmont, WV,
though most enlisted military service member fingerprint cards received
after 1990, and all military-related fingerprint cards received after 19
May 2000, have now been computerized and can be searched internally
by the FBI. In some future build of IAFIS, the FBI may make such civil
file AFIS searches available to other federal crime laboratories. All US
states and larger cities have their own AFIS databases, each with a subset
of fingerprint records that is not stored in any other database. Thus, law
enforcement fingerprint interface standards are very important to enable
sharing records and mutual searches for identifying criminals.
The history of fingerprints, Source: Moore, G, 2005
16
2.3 FINGERPRINT AUTHENTICATION
According to Prabhakar, Salil and Jain, Anil (n.d), fingerprint-based
identification is the oldest method which has been successfully used in numerous
applications. A fingerprint is made of a series of ridges and furrows on the
surface of the finger. The pattern of ridges and furrows as well as the minutiae
points can determine the uniqueness of a fingerprint. Minutiae points are local
ridge characteristics that occur at either a ridge bifurcation or a ridge ending.
Fingerprinting is the oldest method of successfully matching an identity. A
person’s fingerprints are a complex combination of patterns known as lines,
arches, loops and whorls (Biometric Technology, Inc, 2002). The most
distinctive characteristics are the minutiae, the smallest details found in the ridge
endings. Fingerprints cannot be forged and every individual has a unique print.
Fingerprints have some advantages such as the prints remain the same
throughout a person’s lifetime, the fingerprinting is neither frightening nor
emotionally disturbing and people’s prints are unique. Fingerprints also have
some disadvantages. There are searching through a huge database can be rather
slow, dirt on the finger or injury can blur the print, a fingerprint template is rather
large compared to other biometric devices.
Fingerprints were one of the first biometrics to be adopted and have become
synonymous with reliable personal identification. Among other biometrics
technology, fingerprint has several advantages such as its universality, high
distinctiveness and high performance. In universality, large majority of the
human population has legible fingerprints and can easily be authenticated.
Because of its high distinctiveness, twins who share the same DNA have been
shown to have different fingerprint since the ridge structure on the finger is not
encoded in the genes of an individual. Thus, fingerprints represent a stronger
authentication mechanism than DNA.
17
2.4 FINGERPRINT PATTERN
The analysis of fingerprints for matching purposes generally requires the
comparison of several features of the print pattern. These include patterns, which
are aggregate characteristics of ridges, and minutia points, which are unique
features found within the patterns. It is also necessary to know the structure and
properties of human skin in order to successfully employ some of the imaging
technologies. Scientists have found that family members often share the same
general fingerprint patterns, leading to the belief that these patterns are inherited.
The three basic patterns of fingerprint ridges are the arch, loop, and whorl.
2.4.1 Arch
The ridges enter from one side of the finger, rise in the center forming
and arc, and then exit the other side of the finger as figure 5.
2.4.2 Loop
The ridges enter from one side of a finger, form a curve, and then exit on
that same side as figure 6.
2.4.3 Whorl
Ridges form circularly around a central point on the finger as figure 7.
18
19
Figure 2.1: Arch pattern
Figure 2.2: Loop pattern
Figure 2.1: Arch pattern
Figure 2.2: Loop pattern
Figure 5: Arch pattern
Figure 6: Loop pattern
Figure 7: Whorl pattern
2.5 CONCLUSION
Table 1: The advantage, disadvantage, and purpose of fingerprint pattern
Advantage Disadvantage Purpose
Iris - Very high accuracy
- Verification time is
generally less than 5
seconds
- The eye from a dead
person would
deteriorate too fast
to be useful, so no
extra precautions
have to been taken
with retinal scans to
be sure the user is a
living human being
- Intrusive
- A lot of
memory for the
data to be stored
- Very expensive
- Analyze the features in
the colored tissue
surrounding the pupil
which has more than
200 points that can be
used for comparison,
including rings,
furrows and freckles.
Iris recognition
technology combines
computer vision,
pattern recognition,
statistical inference,
and optics
Retinal - Very high accuracy
- There is no known
way to replicate a
retina
- The eye from a dead
person would
deteriorate too fast
to be useful, so no
extra precautions
have to been taken
with retinal scans to
- Very intrusive
- It has the stigma
of consumer's
thinking it is
potentially
harmful to the
eye
- Comparisons of
template
records can take
upwards of 10
- Retinal scanners are
typically used for
authentication and
identification
purposes. Retinal
scanning has been
utilized by several
government agencies,
prisons, and medical
applications.
20
be sure the user is a
living human being.
seconds,
depending on
the size of the
database.
- Very expensive.
Facial - Non-intrusive
- Cheap technology
- 2D recognition
is affected by
changes in
lighting, the
person’s hair,
the age, and if
the person wear
glasses.
- Requires
camera
equipment for
user
identification;
thus, it is not
likely to
become popular
until most PCs
include cameras
as standard
equipment.
- Commonly used for
security purposes but
are increasingly being
used in a variety of
other applications.
Finger
- Very high accuracy. - For some
people it is very
- Used to identify
individuals and verify
21
- Is the most
economical
biometric PC user
authentication
technique.
- it is one of the most
developed
biometrics
- Easy to use.
- Small storage space
required for the
biometric template,
reducing the size of
the database
memory required
- It is standardized.
intrusive,
because is still
related to
criminal
identification.
- It can make
mistakes with
the dryness or
dirty of the
finger’s skin, as
well as with the
age (is not
appropriate with
children,
because the size
of their
fingerprint
changes
quickly).
- Image captured
at 500 dots per
inch (dpi).
Resolution: 8
bits per pixel. A
500 dpi
fingerprint
image at 8 bits
per pixel
demands a large
memory space,
human fingerprints.
22
240 Kbytes
approximately
→ Compression
required (a
factor of 10
approximately)
Table 1 shows the advantage, disadvantage and purpose of fingerprint pattern.
Based on the Table 1, the fingerprint has more advantage between the others it is
one of the developed biometrics and easy to use.
23
CHAPTER 3: RESEARCH METHODOLOGY
3.1 INTRODUCTION
This project is an open source microcontroller. This PIC microcontroller based project designed to develop a fingerprint attendance system using SNFPR- UART fingerprint reader module. This project is able to store numbers of fingerprints and perform matching to mark users’ attendance on selected day. Furthermore, exporting attendance list to text file is also supported by system with the help of Graphical User Interface (GUI) provided. This project will provides hands-on experience in interfacing fingerprint reader with PIC microcontroller through UART (Universal Asynchronous Receiver / Transmitter). On the other hand, also include an extra programmed UART port to interface with PC. Figure 8 show the flow of project and Figure 9 shows the system overview.
24
END
Documentation
Integrate graphical user interface (GUI) and C program with hardware
Build electronic circuits for portable finger print recognize
system.
Develop based graphical user interface (GUI)
START
Figure 8: Flow of project
3.2 COMPONENT OVERVIEW
3.2.1 PIC16F876A
Based on PIC16F876A (Figure 10) are useful in this system because
that powerful (200 nanosecond instruction execution) yet easy-to-
program (only 35 single word instructions) CMOS FLASH-based 8-
bit microcontroller packs Microchip’s powerful PIC® architecture
into a 28-pinpackage and is upwards compatible with the PIC16C5X,
PIC12CSN-FPR-UART and PIC16C7X devices. Feature of the
device:
• 256 bytes of EEPROM data memory
• Self programming
• ICD (In Circuit Debugging function)
• 2 Comparators
• 5 channels of 10-bit Analog-to-Digital (A/D) converter
• 2 capture/compare/PWM functions
• The synchronous serial port can be configured as either 3-wire
Serial Peripheral Interface (SPI™) or the 2-wire Inter-Integrated
Circuit (I²C™) bus
• Universal Asynchronous Receiver Transmitter (USART)
25
LCD Display
LEDS Signal
16F876A
Push Buttons
SN-FPR-UART
Fingerprint Reader
Personal Computer
BUZZER
Figure 3.2: System OverviewFigure 3.2: System OverviewFigure 9: System Overview
3.2.2 SN-FPR-UART
SN-FPR-UART is a compact fingerprint module with built in
memory. The reader featured with direct interface with
microcontroller through UART port and high acquisition/
identification speed. SN-FPR-UART fingerprint reader provides
developers and hobbyists a simple way to include fingerprint reading
feature in this project. Figure 11 shows the correct way to scan the
fingerprint.
3.2.3 Interface LCD
26
Figure 3.3: PIC16F876A
Figure 3.4: The way to scan the fingerprint
Figure 3.3: PIC16F876A
Figure 3.1: The way to scan the fingerprint
Figure 10: PIC16F876A
Figure 11: The way to scan the fingerprint
Figure 12 shows the connections, resistor R8 and R9 (refer table 3.1)
are used to avoid disturbance from RB6 and RB7 when the two pins
used for program the PIC microcontroller.
Table 2: Pin Description
Pi
n
Name Pin Function Connection
1 VSS Ground GND
2 VCC Positive supply for LCD 5V
3 VEE Contrast adjust Connected to a preset
4 RS Select register or data register RC4
5 R/W Select read data or write GND
6 E Start data read or write data RC5
7 DB0 Data bus pin RB0
8 DB1 Data bus pin RB1
9 DB2 Data bus pin RB2
10 DB3 Data bus pin RB3
11 DB4 Data bus pin RB4
12 DB5 Data bus pin RB5
13 DB6 Data bus pin RB6
14 DB7 Data bus pin RB7
15 LED+ Backlight positive input 5V
16 LED- Backlight negative input GND
Table 2 show the name, pin function, and connection of LCD interface. There are 16 pins in LCD interface. This LCD using the 5V for positive supply and also has LED+ backlight positive input and Backlight negative input for LED.
27
Figure 3.5: Interface LCD (2 x 16 Characters)Figure 3.5: Interface LCD (2 x 16 Characters)Figure 11: Interface LCD (2 x 16 Characters)
3.3 HARDWARE DEVELOPMENT
3.3.1 Power Supply
By this project will be choosing either AC to DC adaptor or 9V-12V
to power up the circuit. Higher input voltage will produce more heat
at LM7805 voltage regulator. Typical voltage is 12V. LM7805 will
still generate some heat at 12V. There are two type of power
connector for the circuit, DC plug (J1) and 2510-02 (Power
Connector). Normally AC to DC adaptor can be plugged to J1 type
connector. Refer to Figure 13, the D1 is use to protect the circuit from
wrong polarity supply. C3 and C4 is use to stabilize the voltage at the
input side of the LM7805 voltage regulator, while the C5 and C6 is
use to stabilize the voltage at the output side of the LM7805 voltage
supply. LED is a green LED to indicate the power status of the circuit.
R1 is resistor to protect LED from over current that will burn the
LED.
3.2.2 Push Button as Input for PIC microcontrollerThree I/O pin is needed for three push button as input of PIC
microcontroller. Another push button is use for RESET. The
connection of the push button to the I/O pin is shown in Figure 14.
The I/O pin should be pull up to 5V using a resistor (with value range
1K-10K) and this configuration will result an active-low input. When
the button is being pressed, reading of I/O pin will be in logic 0, while
the button is not pressed, reading of that I/O pin will be logic 1.
28
Figure 3.2: Schematic of Power Supply DiagramFigure 12: Schematic of Power Supply Diagram
3.3.3 LED as output of PIC microcontroller
Three I/O pin is needed for two LEDs and Buzzer as output of PIC
microcontroller. The connections are shown in Figure 15. The I/O pin
should be pull too HIGH in order to on the LEDs and buzzer. The
transistor is used to provide more current for the buzzer.
3.3.4 Ports for UART interface
In this project, there are three ports for UART interface. One port is
connected to the default (internal) UART pins in PIC microcontroller
which are RC6 and RC7. Another two ports are connected to 4 I/O
pins of PIC microcontroller. Resistor connected to each of TX and RX
pin to avoid signal disturbance. Figure 16 shows the connections.
29
Figure 3.7: Schematic of Push Button as input for PIC microcontroller
Figure 3.3: Schematic of LED as output of PIC microcontroller
Figure 13: Schematic of Push Button as input for PIC microcontroller
Figure 15: Schematic of LED as output of PIC microcontroller
3.3.5 Soldering process
3.3.5.1 Soldering Iron Pin
Soldering process has start by solder the electronic
components one by one according the symbols and overlays
on the Printed Circuit Board (PCB). Ensure the component
value and polarity is correctly soldered. The polarity electronic
component such as capacitor, diode, PIC, buzzer, and LED
should be soldered in right polarity on the circuit board. Figure
17 shows the soldering the iron pin.
30
Figure 3.9: Schematic of ports for UART interface
Figure 15: Soldering iron pin
3.3.5.2 Soldering the board
Based on the Figure 18, it is shows the entire component requirement that need to soldering on the board. The require components are:
o Reset button (to reset the microcontroller).
o Push button.
o UIC00A box header (connect to UIC00A/B programmer to
load program).
o 2510-02 connector (power connector).
o 2510-04 connector (UART connector).
o Parallel LCD 2x16.
o Preset (adjust contrast of LCD display).
o Crystal (20MHz).
o 9. LEDs 3mm.
o PIC16F876A.
o Buzzer.
o Slide switch (to ON or OFF the circuit).
13. LM7805 (+5V Regulator)
The result shows in Figure 19.
31
Figure 3.11: Fully of PCB boardFigure 16: Fully of PCB board
3.4 PROJECT REQUIREMENT
Table 3: List of Component
No Component Product Code Quantity
1 IC PIC16F876A IC-PIC-16F876A 1
2 IC Socket-28 pin(slim) IS-28PIN(S) 1
3 Crystal H49S (Low Profile) 20MHz CR-H49S-20M 1
4 Voltage Regulator +5V VR-7805 1
5 Diode 1N4007 DI-1N4007 1
6 Diode 1N4148 DI-1N4148 1
7 Electrolytic Capacitor 16V 47uF CP-EC-16-47UF 2
8 Multilayer Capacitor 0.1uF CP-CC-0.1UF 6
9 Ceramic Capacitor 30pF CP-CC-30PF 2
10 Resistor 1/4W 330R RS-025W-330R 3
11 Resistor 1/4W 10K RS-025W-10K 4
12 Resistor 1/4W 1K RS-025W-1K 3
13 LED 3mm Green DS-LED-3NG 1
14 LED 3mm Yellow DS-LED-3NY 1
15 LED 3mm Orange DS-LED-3NO 1
16 PCB for PR27 PCB-PR-027 1
17 2510 PCB Connector 4 Ways CN-04-2510 3
18 Slide switch 3 pins (Black) SW-SL-3N-061206 1
19 DC Plug (Adaptor Socket) CN-HL-2527-B 1
20 6x6x1 Push Button 2 Pins SW-PBM-2N-060601 4
21 Buzzer-PCB Mount SO-BUZZ-PCB 1
32
22 Preset 5K RS-RM-065-5K 1
23 Transistor 2N2222 TR-2N-2222 1
24 10 Ways Straight Box Header CN-IDC-BOX-10 1
25 LCD (16x2) DS-LCD-JHD162A 1
26 Straight Pin Header(Male) 16 Ways CN-PH-M140S 1
27 Straight Pin Header(Male) 2 Ways CN-PH-M140S 3
28 Mini Jumper CN-PH-MJ 3
29 2510 PCB Connector 2 Ways CN-02-2510 1
30 Bolt M3x6mm HD-PM-M3-6 4
31 M3 Nut HD-PM-M3-NUT 4
32 Fingerprint Reader module SN-FPR-UART 1
Optional
33 UIC00A Programmer UIC00A Programmer 1
34 AC to DC adaptor AC to DC adaptor 1
35 UC00A USB to UART Converter
UC00A USB to
UART Converter 1
Table 3 shows the component/part/hardware that was used to complete the project. RM538 were used to purchase the entire item.
3.5 CONCLUSION
In conclusion, two method were used in assemble to the component, using the battery and USB. The coding was based on combination of MPLAB. The complete system is able to work properly without any problem but the testing is yet to come on the next chapter
33
34
CHAPTER 4: RESULTS AND DISCUSSION
4.1 INTRODUCTION
This chapter covers the testing and result. The testing was done in two situations, by using the battery and USB. Both of the result is explained in each sub topic.
4.2 Testing PR29 PCB Board with SN-FPR-UART Fingerprint Reader (Without UC00A)
After completing installation and soldering of electronic components on a
circuit, attempts were made to use the 9V battery to turn on the PCB board. It
is without using UCU00A.
Using a battery as the source, the user can save the data by placing a finger on
the fingerprint reader. At start-up, it will display on the LCD are two options
it is admin and user. Admin should be set first as admin because admin can
manage the system with options provided in Admin mode. Users are only
allowed to use the system attendance to record the attendance. The figure 20
shows the PCB board with fingerprint reader without UC00A.
35Figure 4.1: PCB board with fingerprint reader (without UC00A)
Figure 18: PCB board with fingerprint reader (without UC00A)
The result shows successfully with the battery 9V as input.
4.3 Testing PR29 PCB board with SN-FPR-UART Fingerprint Reader (With UC00A)
Being hardware installation is set up correctly. UART connection used to
connect to a PC serial port. UC00A's drivers must be installed in the
computer. After UC00A connected to the USB port, the TX of PCBs has to
connect TX RX of UC00A of UC00A while connected to RX of PCBs as
Figure 22.
Fingerprint reader GUI used to export attendance list to personal computers.
Fingerprint reader GUI has been developed by using Microsoft Visual Basic
software as shown in Figure 24. Communication port is set to the largest
number after the driver installation. Baud rate used is 19200. There are two
options on the target device "interface with PR29" and "interface with
Reader". Interface with PR29 used to export attendance from the system as
shown in Figure 25.
36
Figure 19: Illustrations of the connections
37
Figure 20: Connections for PCB-Fingerprint Reader-UC00A
Figure 21: Illustration of the connection
38
Figure 22: Fingerprint Reader GUI Panel
Figure 23: Fingerprint Reader GUI export attendance
CHAPTER 5: CONCLUSION AND RECOMMENDATION
5.1 CONCLUSION
This project mainly comprised of development of attendance management
system and fingerprint identification system. Attendance management is very
helpful in saving valuable time of students and teachers, paper and generating
report at required time. The system successfully took the attendance both at
lectures and examinations as discuss in Chapter 4. The project successfully
captured new fingerprints to be stored in the database; scanned fingerprints
placed on the device sensor and compared those stored in the database
successfully. The result of the system was acceptable and would be
considered for full implementation especially because of its short execution
time and reports generation.
5.2 RECOMMENDATION
The following suggestions should be considered in carrying out further work
on this study:
The system can be linked with the Unikl MFI Campus central
database so that the student registration phase can be eliminated and
the bio-data can be directly from the database.
The university should acquire the fingerprints of all students at
admission.
The components could be chosen and assembled in a commercialized
manner: instead of a stand-alone fingerprint scanner and a laptop, the
unit could have the fingerprint scanner, a small LCD screen and a
keypad all attached to the wall of each classroom.
39
REFERENCES
R. Heidn. A world history of fingerprint, Chinese People Public
Security University Press. 2008.
Neeta Nain, Deepak B M, Dinesh Kumar, ManishaBaswal, and Biju
Gautham. Optimized Minutiae–Based Fingerprint Matching, Proceedings.
2008.
Stephan huckemann,Thonmas Hotz, and Axel Munk, Global Models
for the Orientation Field of Fingerprints: An Approach Based on Quadratic
Differentials, IEEE Transactions. 2008.
40
APPENDIX A: FLOW CHART SEQUENCE OF ATTENDANCE MANAGEMENT SYSTEM BY USING
FINGERPRINT RECOGNITION
41
42
MODE 1 OPERATION: SET DAY
43
MODE 2 OPERATION: ADD NEW DATA
44
MODE 3 OPERATION: DELETE A DATA
45
MODE 4 OPERATION: DELETE ALL DATA
46
MODE 5 OPERATION: CHANGE ADMIN
47
MODE 6 OPERATION: VIEW ATTENTAND
MODE 7 OPERATION: VIEW ATTENDANCE
MODE 8 OPERATION: EXPORT
48
9: RESET ADMIN FLOW
10. ADD NEW FINGERPRINT TO USER SELECTED/ADMIN
49
50
APPENDIX B: CIRCUIT DIAGRAM
51
Figure 1: Microcontroller
Figure 2: Crystal 20MHz
52
Figure 3: ICSP PROGRAMMER