Development of an Electronic Attendance Biometric Registration System

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-27 Number-3
Year of Publication : 2015
Authors : Falohun A.S., Oke A.O., Gbadamosi O.A.
DOI :  10.14445/22312803/IJCTT-V27P122


Falohun A.S., Oke A.O., Gbadamosi O.A. "Development of an Electronic Attendance Biometric Registration System". International Journal of Computer Trends and Technology (IJCTT) V27(3):126-130, September 2015. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
To answer the cravings of parents or guardians quest for update on their children or ward`s class attendance activities, the fingerprintbased electronic attendance registration system was developed with Microsoft’s C# on the .NET framework and Microsoft’s Structured Query Language (SQL) Server 2005 as the backend. The technology consists of two processes namely; enrolment and authentication. During enrolment, the fingerprint of the user is captured and its unique features extracted and stored in a database along with the users identity as a template for the subject. The unique features called minutiae points were extracted using the Crossing Number (CN) method which extracts the ridge endings and bifurcations from the skeleton image by examining the local neighbourhoods of each ridge pixel using a 3 x 3 window. During authentication, the fingerprint of the user is captured again and the extracted features compared with the template in the database to determine a match before attendance is made after which an e-mail will be sent to the parent or guardian.

[1] Kshamaraj G. and Sanjay. G., (2012), " Iris Recognition Using Gabor Wavelet." International Journal of Engineering Research and Technology (IJERT) Vol 1. Issue 5.
[2] Maltoni, D., Maio, D., Jain, A. K., and Prabhakar, S., (2003). Handbook of fingerprint recognition. Springer-Verlag.
[3] R.Cappelli, A.Lumini, D.Maio, and D.Maltoni, (2007) “Fingerprint Image Reconstruction from Standard Templates”, IEEE Transactions, Vol.29, pp.1489-1503.
[4] Udulag U.(2006) ., Fingerprint Verification Competition. [5] Cappelli R., Ferrara M., Franco A.and Maltoni D.,(2007), "Fingerprint verification competition 2006", Biometric Technology Today, vol.15, no.7-8, pp.7-9.
[6] Udulag U.and Jain A.K.(2004) ," Attacks on Biometric Systems: a case study in Fingerprints". Proc. SPIE-EI Security, Steganography & Watermarking of Multimedia Contents VI. pp: 622-633, San Jose, CA.
[7] Lahane P.U. and Ganorkar S.R. (2012), " Fusion of Iris & Fingerprint Biometric for Security Purpose ". International Journal of Scientific & Engineering Research. Vol 3, Issue 8, pp:1-5.
[8] Jain L.C., Halici U., Hayashi I., Lee S.B.,and Tsutsui S.(1999) , `` Introduction to Fingerprint Recognition.`` International Series on Computational Intelligence by CRC Press LLC. pp:42-45.
[9] Falohun A.S, Omidiora E.O., Fakolujo A.O and Ojo J.A. (2013) , " Development of an Iris-Based Access Control System Using a Two-Level Segmentation Approach." International Journal of Computer Trends and Technology (IJCTT). Vol 4, Issue 5:pp 1318-1326.
[10] Pallavi Verma and Namit Gupta (2013) , " FingerprintBbased Student Attendance System Using GSM." International Journal of Science and Research. Vol 2 issue 10, pp:128-131.
[11] Karthik Vignesh E., Shanmuganathan S, A. Sumithra, S. Kishore and P. Karthikeyan (2013) , " A Foolproof Biometric Attendance Management System., International Journal of Information and Computation Technology. Vol 3, No 5, pp:433- 438.
[12] Ayed B., Masmoudi A.D. and Masmoudi D.S.(2011) , " A New Human Identification based on Fusion Fingerprints and Faces Biometrics using LBP and GWN descriptors.", 8th IEEE International Multi-conference on Systems, Signals and Devices . pp: 1-7.

Authentiction , Biometric, Verification, Email , Minutiae.