CHAPTER I-5
-
Upload
nonukes-subaran -
Category
Documents
-
view
212 -
download
0
description
Transcript of CHAPTER I-5
![Page 1: CHAPTER I-5](https://reader035.fdocuments.net/reader035/viewer/2022080913/563db864550346aa9a9345e7/html5/thumbnails/1.jpg)
CHAPTER I
INTRODUCTION
Man has been implementing all kinds of new technologies to both enhance learning and
improve operations. By using technology, the problems and costs associated with the society can
be avoided and new standards of accountability can be put into place.
In our modern world today, computers are now one of the best things that can help us in
the business world. By the use of a computer, task can be done automatically and that will lead to
saving the countless hours. Biometric system is an ideal way for businesses providing way of full
security.
Many areas in a school require identification. The most common kinds of identification
currently in use is picture ID card. Using a biometric finger scanning device can assure
administrators that those entering their schools actually belong there. Administrators will have an
irrefutable record of the date and time of each student entry into the building. The biometric
fingerprint verification system will eliminate the problem that administration met and provide
specific solution and specific needs of the administration.
![Page 2: CHAPTER I-5](https://reader035.fdocuments.net/reader035/viewer/2022080913/563db864550346aa9a9345e7/html5/thumbnails/2.jpg)
Project Context
The researchers’ respondents of this project were the school director and the students of
ACLC Tacloban. The group started proposing the project by the 3rd week of November, then
started researching and developing the project by the 4th week of December and finished the
chapters 1 and 2 by the 19th day of December. Schools have been implementing all kinds of new
technologies to both enhance learning, security and improve operations.
The project’s development was supervised by the I.T. and Technical advisers to help the
team maintain the developed project and to lessen errors. For the documentation, the Technical
adviser checked the grammatical errors and the contents of the project. For the system on the
other hand, the I.T. adviser suggests what is needed for the application, what to add, and what to
remove.
Purpose and Description
The purpose of this project is to provide secure and more reliable to the users by using
the biometric fingerprint entrance system.
The researchers is preparing for more reliable security in the near future. In this system
the project will help to eliminate the security risks of the school. By using fingerprint for
verification of the student the problems and costs associated with the current methods can be
avoided. The system is more reliable priop to the existing system. The propose system is easy to
use for the students this will improve the quality life of everyone since biometrics are so closely
bound to a person, they are thought to be more reliable and not easily forgotten, lost, stolen,
falsified or guessed. This is because biometric identifier relies on uniqe biological information
![Page 3: CHAPTER I-5](https://reader035.fdocuments.net/reader035/viewer/2022080913/563db864550346aa9a9345e7/html5/thumbnails/3.jpg)
about a person. So we created this system in order for the benefit and satisfactory of the school
and its students.
Objectives of the Study
General Objectives
To design a Student Entrance Fingerprint Verification System of ACLC College
Tacloban.
Specific Objectives
1. To provide a biometric fingerprint of authorized person of the school campus.
2. To provide a safe and security environment for everyone on campus.
3. To provide an accurate student fingerprint verification to efficient operation of the school.
Scope and Limitation of the Study
This study will cover the fingerprint verification of the existing security system of
ACLC College Tacloban. The researchers aim to create an identification system that would allow
the administrator to control, manipulate and to have a secured database for keeping the record, as
well as to track easily and accurately. This includes the daily time record of each of the students
that verify fingerprints that the correct person is logging in and out. This also includes the daily
time record of the visitors that is logging in and out in the campus. The Biometric Fingerprint
Identification System will automatically identify the students or visitor and save it to the
database. And the administrator will manually print the record.
![Page 4: CHAPTER I-5](https://reader035.fdocuments.net/reader035/viewer/2022080913/563db864550346aa9a9345e7/html5/thumbnails/4.jpg)
However, the picture ID card is basically one of the spirit of identification held in any
other business. A picture ID card system is a process whereby a school keeps track of their
student and personnel who enters the school. In its simplest sense it can be done manually by a
visual identification of each day. In this way it is possible to keep a record of the students
coming in to the school campus. The same case applies in ACLC College and as a result, the
identification system becomes prone to human error and would be more time consuming and
security is also being risked.
![Page 5: CHAPTER I-5](https://reader035.fdocuments.net/reader035/viewer/2022080913/563db864550346aa9a9345e7/html5/thumbnails/5.jpg)
CHAPTER II
REVIEW OF RELATED LITERATURE AND SYSTEMS
This chapter presents a brief overview of the literature in the field of Student Entrance
Fingerprint Verification System. The advent of the Internet Technology innovation such as
Biometric device, In particular Fingerprint reader, as an electronic device to manuscript
verification in the online environment. However, the use of this device is still insignificant .The
aims of this chapter are to provide different studies and description about similar areas from both
foreign and local resources that are significant to the study.
RELATED LITERATURE
The word biometric comes from the Greek words Bios, meaning Life, and
Metrics, meaning measure. Biometrics can be defined as measurable physiological and
behavioral characteristics that can be utilized to verify the identity of an individual that can
include fingerprint verification, hand geometry, retinal scanning, iris scanning, facial recognition
and signature verification. Biometric authentication is considered the automatic identification or
identity verification of an individual using either biological feature they possess physiological
characteristic like a fingerprint. Many Biometric techniques have been developed and being
improved with the most successful being applied in every security application and law
enforcement. Among them fingerprint recognition is considered the most powerful technique for
security authentication. Today, the focus is on using biometric face recognition, iris recognition,
Hand geometry recognition and identifying characteristics to stop and improved security
measures. This section provides a brief history on biometric security and finger recognition.
![Page 6: CHAPTER I-5](https://reader035.fdocuments.net/reader035/viewer/2022080913/563db864550346aa9a9345e7/html5/thumbnails/6.jpg)
Year 1858, the first systematic capture of hand image for identification purposes is
recorded was used by William Herschel, Civil Service of India who recorded a handprint on the
back of a contract for each worker to distinguish employees.
(Peter Komarinski).
Year 1870, Alphonse Bertillon who develops a method of identifying individuals based
on detailed records of their body measurements, physical descriptions and photographs. This
method was termed as “Bertillonage” or anthropometrics and the usage was aborted in 903 when
it was discovered that some people share same measurement and physical characteristics.
(State University of New York at Canton, 2003).
Year 1892, Francis Galton develops a classification system for finger prints, Galton wrote
a detailed study of fingerprints in which he presented a new classification system using prints
from all ten fingers. The characteristics (minutiae) that Galton used to identify individuals are
still used today. These details are often referred to as Galton’s details.
(Galton.org, Scottish Criminal Record Office, 2002)
Year 1896, Edward Henry develops a fingerprint classification system, which search of a
method of identification to implement concurrently or to replace anthropometrics. Henry
consulted Sir Francis Galton regarding fingerprinting as a method of identifying criminals. One
of Henry’s workers Azizul Haque, developed a method of classifying and storing the information
so that searching could be performed easily and efficiently. Sir Henry Classification System used
for many years by the Federal Bureau of Investigation and other criminal justice organizations
![Page 7: CHAPTER I-5](https://reader035.fdocuments.net/reader035/viewer/2022080913/563db864550346aa9a9345e7/html5/thumbnails/7.jpg)
the perform ten print fingerprint searches. (Fingerprint Centenary: Press Pack –Henry (1850-
1931)Metropolitan Police )
REVIEW OF RELATED SYSTEM
The following is the Review of Related System of Using Biometric such as Face
Recognition, Speaker Recognition, Hand geometry Recognition, Vascular Recognition,
1960s- Face Recognition becomes semi- automated
The first semi-automatic face recognition system was developed by Woodrow W.
Bledsoe under contract to the US Government. This System required the administrator to locate
features such as eyes, ears, nose, and mouth on the photographs. This system relied solely on the
ability to extract useable feature point. It calculated distances and ratios to a common reference
point that was compared to the reference data.
(In Memoriam Woodrow Wilson Bledsoe the University of
Texas at Austin, department Of Computer Science)
1996- NIST begins hosting annual Speaker recognition evaluation
Under funding from the National Security Agency, the National Institute of Standards
and Technology (NIST) Speech Group began hosting yearly evaluation in 1996. The NIST
Speaker Recognition Evaluation Workshop aims to foster the continued advancement of the
speaker recognition community.
(NIST Speaker Recognation Evaluation 25 April 2005,
NIST speech Group, 23 June 2005)
1960 – First model of acoustic speech production is created
![Page 8: CHAPTER I-5](https://reader035.fdocuments.net/reader035/viewer/2022080913/563db864550346aa9a9345e7/html5/thumbnails/8.jpg)
A Swedish Professor, Gunnar Fant, published a model describing the Physiological
components of acoustic speech production. His findings were based on the analysis of x-rays of
individuals making specified phonic sound. These findings were used to better understand the
biological component of speech, a concept crucial to speaker recognition.
(John D. Woodward, Jr,Nicolas M. Orlans, and Peter T.
Higgins, Biometrics)(New York: McGraw Hill Osborne, 2003).
1996- Hand geometry is implemented at the Olympic games
A major public use of hand geometry occurred at the 1996 Atlanta Olympic games where
hand geometry system were implemented to control and protect physical access to the Olympic
Village. This was significant accomplishment because the system handled the enrollment of over
65,000 people. Over 1 million transactions were processed in a period of 28 days.
(IR Recognition System)
2000 – First research paper the describing the use of Vascular patterns for recognition is
published
This paper describes the technology that was to become the first commercially available
vascular pattern recognition system in 2000. The technology uses the subcutaneous blood vessel
pattern in the back of the hands to achieve recognition.
(Sng-Kyum Im, Yung-Man Park Young woo Kim, Sang
Chan Han, Soo-Won Kim and Chul-Hee Kang,”Biometric
Identification System by extracting hand Vein Patterns.” )
1936 – the concept of using iris pattern for identification was first proposed by
Ophthalmologist Frank Burch (Iradian Technology, 2003).
![Page 9: CHAPTER I-5](https://reader035.fdocuments.net/reader035/viewer/2022080913/563db864550346aa9a9345e7/html5/thumbnails/9.jpg)
During 1960, the first semi- automatic face recognition system was developed by
Woodrow W. Bledsoe, which used the location of eyes, ears, nose and mouths on the
photographs for recognition purposes. In the same year, the first model of acoustic speech
production was created by a Swedish Professor, Gunnar Fant. His invention is used in today’s
speaker recognition system.
(Woodward et al 2003)