CHAPTER I-5

13
CHAPTER I INTRODUCTION Man has been implementing all kinds of new technologies to both enhance learning and improve operations. By using technology, the problems and costs associated with the society can be avoided and new standards of accountability can be put into place. In our modern world today, computers are now one of the best things that can help us in the business world. By the use of a computer, task can be done automatically and that will lead to saving the countless hours. Biometric system is an ideal way for businesses providing way of full security. Many areas in a school require identification. The most common kinds of identification currently in use is picture ID card. Using a biometric finger scanning device can assure administrators that those entering their schools actually belong there. Administrators will have an irrefutable record of the date and time of each student entry into the building. The biometric

description

lalala

Transcript of CHAPTER I-5

Page 1: CHAPTER I-5

CHAPTER I

INTRODUCTION

Man has been implementing all kinds of new technologies to both enhance learning and

improve operations. By using technology, the problems and costs associated with the society can

be avoided and new standards of accountability can be put into place.

In our modern world today, computers are now one of the best things that can help us in

the business world. By the use of a computer, task can be done automatically and that will lead to

saving the countless hours. Biometric system is an ideal way for businesses providing way of full

security.

Many areas in a school require identification. The most common kinds of identification

currently in use is picture ID card. Using a biometric finger scanning device can assure

administrators that those entering their schools actually belong there. Administrators will have an

irrefutable record of the date and time of each student entry into the building. The biometric

fingerprint verification system will eliminate the problem that administration met and provide

specific solution and specific needs of the administration.

Page 2: CHAPTER I-5

Project Context

The researchers’ respondents of this project were the school director and the students of

ACLC Tacloban. The group started proposing the project by the 3rd week of November, then

started researching and developing the project by the 4th week of December and finished the

chapters 1 and 2 by the 19th day of December. Schools have been implementing all kinds of new

technologies to both enhance learning, security and improve operations.

The project’s development was supervised by the I.T. and Technical advisers to help the

team maintain the developed project and to lessen errors. For the documentation, the Technical

adviser checked the grammatical errors and the contents of the project. For the system on the

other hand, the I.T. adviser suggests what is needed for the application, what to add, and what to

remove.

Purpose and Description

The purpose of this project is to provide secure and more reliable to the users by using

the biometric fingerprint entrance system.

The researchers is preparing for more reliable security in the near future. In this system

the project will help to eliminate the security risks of the school. By using fingerprint for

verification of the student the problems and costs associated with the current methods can be

avoided. The system is more reliable priop to the existing system. The propose system is easy to

use for the students this will improve the quality life of everyone since biometrics are so closely

bound to a person, they are thought to be more reliable and not easily forgotten, lost, stolen,

falsified or guessed. This is because biometric identifier relies on uniqe biological information

Page 3: CHAPTER I-5

about a person. So we created this system in order for the benefit and satisfactory of the school

and its students.

Objectives of the Study

General Objectives

To design a Student Entrance Fingerprint Verification System of ACLC College

Tacloban.

Specific Objectives

1. To provide a biometric fingerprint of authorized person of the school campus.

2. To provide a safe and security environment for everyone on campus.

3. To provide an accurate student fingerprint verification to efficient operation of the school.

Scope and Limitation of the Study

This study will cover the fingerprint verification of the existing security system of

ACLC College Tacloban. The researchers aim to create an identification system that would allow

the administrator to control, manipulate and to have a secured database for keeping the record, as

well as to track easily and accurately. This includes the daily time record of each of the students

that verify fingerprints that the correct person is logging in and out. This also includes the daily

time record of the visitors that is logging in and out in the campus. The Biometric Fingerprint

Identification System will automatically identify the students or visitor and save it to the

database. And the administrator will manually print the record.

Page 4: CHAPTER I-5

However, the picture ID card is basically one of the spirit of identification held in any

other business. A picture ID card system is a process whereby a school keeps track of their

student and personnel who enters the school. In its simplest sense it can be done manually by a

visual identification of each day. In this way it is possible to keep a record of the students

coming in to the school campus. The same case applies in ACLC College and as a result, the

identification system becomes prone to human error and would be more time consuming and

security is also being risked.

Page 5: CHAPTER I-5

CHAPTER II

REVIEW OF RELATED LITERATURE AND SYSTEMS

This chapter presents a brief overview of the literature in the field of Student Entrance

Fingerprint Verification System. The advent of the Internet Technology innovation such as

Biometric device, In particular Fingerprint reader, as an electronic device to manuscript

verification in the online environment. However, the use of this device is still insignificant .The

aims of this chapter are to provide different studies and description about similar areas from both

foreign and local resources that are significant to the study.

RELATED LITERATURE

The word biometric comes from the Greek words Bios, meaning Life, and

Metrics, meaning measure. Biometrics can be defined as measurable physiological and

behavioral characteristics that can be utilized to verify the identity of an individual that can

include fingerprint verification, hand geometry, retinal scanning, iris scanning, facial recognition

and signature verification. Biometric authentication is considered the automatic identification or

identity verification of an individual using either biological feature they possess physiological

characteristic like a fingerprint. Many Biometric techniques have been developed and being

improved with the most successful being applied in every security application and law

enforcement. Among them fingerprint recognition is considered the most powerful technique for

security authentication. Today, the focus is on using biometric face recognition, iris recognition,

Hand geometry recognition and identifying characteristics to stop and improved security

measures. This section provides a brief history on biometric security and finger recognition.

Page 6: CHAPTER I-5

Year 1858, the first systematic capture of hand image for identification purposes is

recorded was used by William Herschel, Civil Service of India who recorded a handprint on the

back of a contract for each worker to distinguish employees.

(Peter Komarinski).

Year 1870, Alphonse Bertillon who develops a method of identifying individuals based

on detailed records of their body measurements, physical descriptions and photographs. This

method was termed as “Bertillonage” or anthropometrics and the usage was aborted in 903 when

it was discovered that some people share same measurement and physical characteristics.

(State University of New York at Canton, 2003).

Year 1892, Francis Galton develops a classification system for finger prints, Galton wrote

a detailed study of fingerprints in which he presented a new classification system using prints

from all ten fingers. The characteristics (minutiae) that Galton used to identify individuals are

still used today. These details are often referred to as Galton’s details.

(Galton.org, Scottish Criminal Record Office, 2002)

Year 1896, Edward Henry develops a fingerprint classification system, which search of a

method of identification to implement concurrently or to replace anthropometrics. Henry

consulted Sir Francis Galton regarding fingerprinting as a method of identifying criminals. One

of Henry’s workers Azizul Haque, developed a method of classifying and storing the information

so that searching could be performed easily and efficiently. Sir Henry Classification System used

for many years by the Federal Bureau of Investigation and other criminal justice organizations

Page 7: CHAPTER I-5

the perform ten print fingerprint searches. (Fingerprint Centenary: Press Pack –Henry (1850-

1931)Metropolitan Police )

REVIEW OF RELATED SYSTEM

The following is the Review of Related System of Using Biometric such as Face

Recognition, Speaker Recognition, Hand geometry Recognition, Vascular Recognition,

1960s- Face Recognition becomes semi- automated

The first semi-automatic face recognition system was developed by Woodrow W.

Bledsoe under contract to the US Government. This System required the administrator to locate

features such as eyes, ears, nose, and mouth on the photographs. This system relied solely on the

ability to extract useable feature point. It calculated distances and ratios to a common reference

point that was compared to the reference data.

(In Memoriam Woodrow Wilson Bledsoe the University of

Texas at Austin, department Of Computer Science)

1996- NIST begins hosting annual Speaker recognition evaluation

Under funding from the National Security Agency, the National Institute of Standards

and Technology (NIST) Speech Group began hosting yearly evaluation in 1996. The NIST

Speaker Recognition Evaluation Workshop aims to foster the continued advancement of the

speaker recognition community.

(NIST Speaker Recognation Evaluation 25 April 2005,

NIST speech Group, 23 June 2005)

1960 – First model of acoustic speech production is created

Page 8: CHAPTER I-5

A Swedish Professor, Gunnar Fant, published a model describing the Physiological

components of acoustic speech production. His findings were based on the analysis of x-rays of

individuals making specified phonic sound. These findings were used to better understand the

biological component of speech, a concept crucial to speaker recognition.

(John D. Woodward, Jr,Nicolas M. Orlans, and Peter T.

Higgins, Biometrics)(New York: McGraw Hill Osborne, 2003).

1996- Hand geometry is implemented at the Olympic games

A major public use of hand geometry occurred at the 1996 Atlanta Olympic games where

hand geometry system were implemented to control and protect physical access to the Olympic

Village. This was significant accomplishment because the system handled the enrollment of over

65,000 people. Over 1 million transactions were processed in a period of 28 days.

(IR Recognition System)

2000 – First research paper the describing the use of Vascular patterns for recognition is

published

This paper describes the technology that was to become the first commercially available

vascular pattern recognition system in 2000. The technology uses the subcutaneous blood vessel

pattern in the back of the hands to achieve recognition.

(Sng-Kyum Im, Yung-Man Park Young woo Kim, Sang

Chan Han, Soo-Won Kim and Chul-Hee Kang,”Biometric

Identification System by extracting hand Vein Patterns.” )

1936 – the concept of using iris pattern for identification was first proposed by

Ophthalmologist Frank Burch (Iradian Technology, 2003).

Page 9: CHAPTER I-5

During 1960, the first semi- automatic face recognition system was developed by

Woodrow W. Bledsoe, which used the location of eyes, ears, nose and mouths on the

photographs for recognition purposes. In the same year, the first model of acoustic speech

production was created by a Swedish Professor, Gunnar Fant. His invention is used in today’s

speaker recognition system.

(Woodward et al 2003)