i
FINGERPRINT AUTHENTICATION SYSTEM FOR
EXAMINATION ATTENDANCE
MUHAMMAD FAIRUL AIMAN BIN SHAFIEI
BACHELOR OF COMPUTER SCIENCE
(COMPUTER NETWORK SECURITY) WITH HONOURS
UNIVERSITI SULTAN ZAINAL ABIDIN
2019
i
DECLARATION
I hereby declare that this report is based on my original work except for quotations and
citations, which have been duly acknowledged. I also declare that it has not been previously or
concurrently submitted for any other degree at University Sultan Zainal Abidin or other
institutions.
____________________________________
Name : Muhammad Fairul Aiman bin Shafiei
Date : ………………………………………..
ii
CONFIRMATION
This is to confirm that the project of Fingerprint Authentication System for Attendance
System was prepared and submitted by Muhammad Fairul Aiman bin Shafiei (Matric Number
BTBL17046876) and has been found satisfactory in terms scope, quality and presentation as
partial fulfilment of the requirement for the bachelor of Computer science (Computer Network
Security) with Honour in University Sultan Zainal Abidin.
The research conducted and the writing of this report was under my supervision.
__________________________________
Supervisor : Cik Nazirah binti Abd Hamid
Date : …………………………………….
iii
DEDICATION
First of all, all praised to Allah, the most Gracious and most Merciful for giving me the
opportunity to undergo this final year project Fingerprint Authentication System for
Attendance Examination.
I would like to thank my family, my parent and to my brothers and sister for supporting
me spiritually and giving me strength throughout writing this thesis and my life in general. my
friends who believed that they can finish the study despite of all the struggles, depression, and
stress we experienced in the making of our final year project.
I also would like to thanks my supervisor Cik Nazirah binti Abd Hamid for giving me
help and support throughout this project. I also would like to thanks my fellow friends who
believed that they can finish the study despite of all the struggles, depression, and stress we
experienced in the making of our final year project. I also want to express my gratitude to my
other lecturers that have help me in completing my project.
iv
ABSTARCT
Biometric techniques have becoming a popular alternative and a reliable means of
identification that can support the evolving incredibly powerful computing. Currently,
universities or institutions still using old fashioned ways to authenticate students before taking
examination. Students must bring exam slip to the hall as their attendance and if the students
forget to bring their slip, they can’t take the exam. Moreover, many students would not or forget
to write down their matric number and exam’s information. In the other hand, the process of
taking students’ attendance manually is a difficult task as well as can consume a lot of time.
The aim of this project is to design and implement fingerprint authentication for examination
attendances using Arduino. This system needs students to scan their fingerprints for
authentication purposes and for identification, the system recognizes an individual by
comparing his/her biometrics with every record in the database. In conclusion, this system can
replace traditional identification and authentication of a student for examination attendance and
can reduce human errors.
v
ABSTRAK
Teknik biometrik telah menjadi alternatif yang popular dan salah satu cara mengenal
pasti yang boleh dipercayai yang dapat menyokong pengkomputeran yang sangat berkuasa.
Pada masa ini, universiti atau institusi masih menggunakan cara lama untuk mengesahkan
pelajar sebelum mengambil peperiksaan. Pelajar mesti membawa slip peperiksaan ke dewan
sebagai kehadiran mereka dan jika pelajar lupa membawa slip mereka, mereka tidak boleh
mengambil peperiksaan. Selain itu, ramai pelajar tidak boleh atau lupa menulis nombor matrik
mereka dan maklumat peperiksaan. Sebaliknya, proses mengambil kehadiran pelajar secara
manual adalah tugas yang sukar dan boleh mengambil banyak masa. Tujuan projek ini adalah
untuk mereka bentuk dan melaksanakan pengesahan cap jari untuk kehadiran peperiksaan
menggunakan Arduino. Sistem ini memerlukan pelajar untuk mengimbas cap jari mereka untuk
tujuan pengesahan dan untuk pengenalpastian, sistem mengiktiraf individu dengan
membandingkan biometriknya dengan setiap rekod dalam pangkalan data. Sebagai
kesimpulan, sistem ini boleh menggantikan pengenalan tradisional dan pengesahan pelajar
untuk kehadiran pemeriksaan dan dapat mengurangkan kesilapan manusia.
vi
TABLE OF CONTENT
PAGE
DECLARATION i
CONFIRMATION ii
DEDICATION iii
ABSTRACT iv
ABSTRAK v
CONTENTS vi
LIST OF FIGURES vii
CHAPTER I INTRODUCTION
1.1 INTRODUCTION 1
1.2 PROBLEM STATEMENT 2
1.3 OBJECTIVE 2
1.4 PROJECT SCOPE 3
1.5 THESIS ORGANIZATION 4
CHAPTER II LITERATURE REVIEW
2.1 INTRODUCTION 5
2.2 FINGERPRINT-BASED
USER AUTHENTICATION
6
2.3 ARDUINO
MICROCONTROLLER
6
2.4 FINGERPRINT MODULE 6
2.5 RELATED WORKS 7
2.6 VERIFY ALGORITHM 9
2.7 SUMMARY 10
CHAPTER III METHODOLOGY
3.1 INTRODUCTION 11
3.2 FRAMEWORK 11
3.3 FLOWCHART 12
3.3.1 FLOWCHART FOR
AUTHENTICATION
13
3.3.2 FLOWCHART FOR
REGISTER
14
USE CASE DIAGRAM 15
3.4 VERIFY ALGORITHM 16
3.5 3.6.1 K-NEAREST
NEIGHBOUR
MINUTIAE CLUSTERING
17
3.6
SUMMARY
18
vii
CHAPTER 4
4.1
4.2
4.3
4.4
4.5
CHAPTER 5
5.1
5.2
5.3
CHAPTER 6
6.1
6.2
6.3
6.4
6.5
IMPEMENTATION
INTRODUCTION
INTERFACE DESIGN
4.2.1 LOGIN FORM
4.4.2 REGISTER FORM
HARDWARE
SOFTWARE
4.4.1 ARDUINO IDE
SOFTWARE
4.4.2 PLX-DAQ TOOL
SUMMARY
RESULT AND
ANALYSIS
INTRODUCTION
RESULT AND ANALYSIS
SUMMARY
SUMMARY
INTRODUCTION
PROJECT CONTRIBUTION
PROJECT CONSTRAINT
FUTURE WORKS
SUMMARY
REFERENCES
16
16
16
17
18
20
20
26
26
27
27
29
30
30
30
31
31
32
viii
LIST OF FIGURES
FIGURE TITLE PAGE
Figure 2.3 Arduino Microcontroller 6
Figure 2.4 Fingerprint module 7
Figure 3.2 Framework 12
Figure 3.3.1 Flowchart for Authentication 13
Figure 3.3.2 Flowchart for Register 14
Figure 3.4
Figure 4.2.1
Figure 4.2.2
Figure 4.3.1
Figure 4.3.2
Figure 4.4.1
Figure 4.4.1.2
Figure 4.4.1.3
Figure 4.4.1.4
Figure 4.4.1.5
Figure 4.4.1.6
Figure 4.4.2
Figure 5.2
Figure 5.3
Use Case Diagram
Login Form
Register Form
Implement of Keyestudio Arduino
Arduino IDE Icon
Library manager in Arduino
Enrol Coding
Output of enrol coding
Fingerprint or Matching coding
PLX-DAQ tool
Result
Table of analysis
15
16
17
18
19
20
21
22
23
24
25
26
27
28
1
CHAPTER 1
INTRODUCTION
1.1 Background
Biometric techniques have become a popular alternative and a reliable means of
identification that can support the evolving incredibly powerful computing. The process to
allow students to sit for an exam was by providing an identity medium such as ID cards.
Currently, universities or institutions still using old fashioned ways. Students still bring exam
slip to the hall as their attendance. Hence, students always forgot to bring their exam slip and
they can’t take the exam. Moreover, without fingerprint as examination attendances, many
students not or forgot to write down their matric number and information. In the other hand,
taking student attendance manually and maintaining it for a long time is a difficult task as well
as wastes a lot of time.
The work aim is to design and implement Fingerprint authentication for examination
attendances using Arduino. This system just needs students to scan their fingerprints for
authentication purposes. In identification, the system recognizes an individual by comparing
his/her biometrics with every record in the database. In conclusion, this system can also reduce
the time for to student to make an attendance process during the examination and this system
can replace traditional identification and authentication of a student.
2
1.2 Problem Statement
The problems that occurs for this application to develop are universities or institutions
are still implementing traditional way to record attendance for examination by using pen and
paper. Next, a student must always bring relevant identification such as identity card and exam
slip to the exam and he/she will be prevented from taking the exam if he/she forget to bring
those items. Furthermore, the process of taking students’ attendance manually is a difficult task
as human can make mistake as well as the process can consume a lot of time.
1.3 Objectives
The objectives of this project are :
• The main objectives for this project are to design a fingerprint
authentication system for examination attendance.
• Next, to implement the fingerprint authentication system for
examination attendance using Arduino.
• Lastly, to test and evaluate the functionality of the system.
1.4 Project Scope
The scopes for this project are to make the system development process easier. The
scope of this project is divided into two which are the admin scope and student scope. First
point of admin scope is the system requires the admin to register their information. Next, the
admin can view the students’ attendance and produce reports and admin can easily analyse the
information regarding the student attendance. Furthermore, the point of student scope are the
system requires the students to register their information and students scan their fingerprints
for the examination attendance.
3
1.5 Thesis Organization
This thesis contains all the information necessary for this study. In Chapter 1, this report
covers project initiation where information on project priorities, scopes, and also project
restriction. In Chapter 2, the article deals primarily with previous research that has been
used as sources for this project.
Chapter 3 is about this project's methodology Each chapter describes the project's
structure and function, and all the information about the software and hardware used to
produce the results by this project. Chapter 4 consists of architecture and simulation to
demonstrate how the biometric use of the fingerprint authentication template functions.
The program design and monitoring will be addressed in chapter 5. Eventually, the
research and the consequence of the experiment and the support of this study are
summarized in Chapter 6.
4
CHAPTER 2
LITERATURE REVIEW
2.1 Introduction
A number of related works exist in the literature on the application of different
information technology tools to student attendance management problems. This chapter
would discuss and describe selected research papers and previous journals that trace similar
techniques and topics that can be referenced for Fingerprint-based user authentication for
examination attendance using Arduino. This chapter also provides research-based on some
comparison between the techniques used among the system that can be used to develop this
system. [7]
2.2 Fingerprint-based user authentication
The biometric method is the identification system in which the person's physical or
behavioural attribute is used to establish the identity of persons. Recognition of fingerprints
works by identifying individuals using their physical structure through the impression of
the minute ridge structures found on each person's fingertips. [7]
The most common biometric methods used are fingerprint-based recognition. It has
been used effectively in various applications, including in the ATM, for validation at the
airport, and many more. There are two methods for matching fingerprints, which are based
5
on minutiae and similarity. Mapping minute areas on a fingerprint is used in the minute-
based technique. [6]
2.3 Arduino Microcontroller
Arduino is an open-source electronic that is widely used nowadays. Nowadays, Arduino
is widely selected as it is straightforward, simple to discover, inexpensive, and on Arduino
there is a huge amount of guide on the internet. Using a USB connection, it can connect
with other devices. In addition, power supply or AC to DC connector can also be used.
Arduino can be programmed using Arduino programming language which can be
downloaded free from the internet. (7)
Figure 2.3 Arduino Microcontroller
2.4 Fingerprint Module
This system uses an electronic fingerprint sensor. This detector detects the sequence of
fingerprints. The image of the scan is converted and saved in memory as a model. This
fingerprint sensor automatically sends data packets to capture images based on the principle
of glass layer ray reflection. Once the fingerprint is captured, it is possible to detect and
search. CCD- Camera is used in the optical fingerprint sensor as a set of light-sensitive
6
LED. It will take a fingerprint photo once the digit is put on the fingerprint reader’s glass
plate. (7)
Figure 2.4 Fingerprint Module
2.5 Related Works
Based on the research, a few systems that similarly to the proposed project were found.
Firstly, Fingerprint Based Attendance System Using Arduino. This work was to simplify
the attendance system using Fingerprint Base Attendance System Using Arduino. In this
system, there were three main parts: enrolling, searching and displaying the attendance.
This simple device started with Arduino's connection with the fingerprint sensor to the
enrolling computer. In the search phase, as soon as the user pressed the fingerprint reader,
it read the user's fingerprint and based on the instructions written in, the user's details were
displayed on the computer. The time, date, username and ID number of the scanning system
were shown on the computer. Microsoft Excel was used in this system to show the
information. PLX-DAQ is a useful tool to connect the Arduino with Excel [7].
7
The second system was the IoT Based Biometric Attendance System. This article
discussed the biometric attendance system that integrated an ESP8266 NodeMCU breakout
board and a fingerprint scanner. The fingerprint scanner processed the user’s fingerprint to
verify the student’s attendance. NodeMCU uploaded the attendance data to Google
Spreadsheet using a service called PushingBox API. Fingerprint processing had three
primary functions: enrolment, searching, and verification. Out of these, enrolment played
an important role. It involved capturing an image of the user’s fingerprint. Searching
involved examining through a set of stored fingerprints and comparing them with the input
fingerprint. Verification involved acknowledging a match between the input fingerprint and
one already presented in the stored fingerprints. The identification of fingerprints of
individuals was done on the basis of both hardware and software techniques. [7]
The third system was the Student Examination Attendance Authentication System
(SEAAS). The article discussed the fingerprint sensor, Arduino UNO board, a Bluetooth
device, a mobile phone to design a prototype that can be used for students’ authentication
for examination purposes thereby preventing impersonation in exams. The button on the
SEAAS was first switched on in order to register a participant, the mobile device software
downloaded on the android phone was enabled. The Bluetooth was switched on from the
app and connected to the HC-05 listed on the android phone as part of the list of Bluetooth
devices. The information of the student such as name and number of the matriculation were
then entered and stored on the mobile device. The record of the saved student could be
accessed on the device from the ' show attendance ' section. The thumb was simply placed
on the fingerprint scanner to document a student's presence and the outcome would be
shown correctly. [1]
8
2.6 Verification Algorithms
K-Nearest Neighbour Minutiae Clustering is one of algorithm that I use in this project.
Fingerprint search is optimized by clustering fingerprint graph feature. The graph shows the
feature of fingerprint and edges represents minutiae. Hence, the clustering of graph information
is done by K-NN clustering algorithm based on Euclidean range between the vertices of the
graph. It is the simplest clustering algorithm. To identify the fingerprint, it reads each
fingerprint clustered graph templates from database and compares it. This continues till the
input fingerprint is matched with fingerprint stored in database otherwise no match found
returns. However, this technique will increase the processing time. [7]
2.7 Summary
This chapter gives an overview of the system concept. Based on the research
conducted, it demonstrates that literature review is one of the important elements as we can
use the new and established process methodology to improve our proposed system. On the
basis of previous articles and reviews, the methodology is selected.
9
CHAPTER 3
METHODOLOGY
3.1 Introduction
The methodology is known as a set of procedures. This chapter will cover the methods
used to build this program. From problem analysis to a system designed to achieve the goals
of the project mentioned earlier in this research report. In fact, this approach is an important
part of ensuring the successful completion of the process.
3.2 Framework
Framework is broad overview, outline or skeleton of interlinked items which supports
a particular approach to a specific objective, and serves as a guide that can be modified as
required by adding or deleting items.
10
Figure 3.2 Framework
Based on Figure 3.2, firstly user need to register with inserting their name and ic number. User
also need to scan their fingerprint for the first time and the system will save it in the database. The next
step is for authentication. User need to log in with enter their username and scan their fingerprint. Next
the system will match the user fingerprint with the fingerprint in the database. Thus, the system will
send result either the fingerprint is matching or not.
3.3 Flowchart
A flow chart is a description of a method graphically or symbolically. That stage of
the process is defined by another symbol which provides a brief description of the step of the
process. The icons of the flow chart are connected with arrows indicating the course of the
stream flow.
11
3.3.1 Flowchart for Authentication
Figure 3.3.1 Flowchart for Authentication
Based on Figure 3.3.1, user need to scan their fingerprint. If fingerprint module found
in database, scan the finger image. If no fingerprint module found, user need to scan the
fingerprint again for the first time. Next, if the fingerprint matched, system will display the
current date, name and matric number in Excel. If fingerprint not matched, system will scan
the finger image again.
12
3.3.2 Flowchart for Register
YES
NO
Figure 3.3.2 Flowchart for Register
Based on Figure 3.3.2, user need to insert name and IC number for registration. Next,
user also need to scan their fingerprint for the first time. If user want to scan their fingerprint
again, user need to repeat from the early step. If user don’t want to take the next fingerprint,
the registration is success.
Start
Insert Name
and No IC
Scan
fingerprint for
First time
Take Next
Fingerprint
Stop
13
3.4 Use Case Diagram
The primary form of system / process specifications for a modern underdeveloped
software program is a UML usage case diagram. Usage cases define the action anticipated
(what) and not the actual process (how) to make it happen. It is possible to denote both textual
and visual representation (i.e. use case diagram) using cases once specified. A central idea of
case modelling is that it helps us to design a system from the point of view of the end user. It
is an effective communication strategy regarding system activity in terms of the consumer by
identifying all externally visible machine behaviour.
User Admin
Figure 3.4 Use Case Diagram
Register
Scan
Fingerprint
Log In
Review
Attendance
14
Based on Figure 3.4, there are two actor which is user and admin. User can register, log
in and scan fingerprint but can’t review attendance. Hence admin can register, log in and review
attendance but can’t scan fingerprint.
3.5 Verification Algorithm
As the aim of this project is to design a fingerprint authentication system for
examination attendance, fingerprint authentication makes use of the image and the physical
characteristics. In this project, matching algorithm is used for fingerprint authentication.
3.5.1 K-Nearest Neighbour Minutiae Clustering
K-Nearest Neighbour Minutiae Clustering is a k-nearest-neighbour algorithm, often
abbreviated k-NN, is an approach to data classification that estimates how likely a data point
is to be a member of one group or the other depending on what group the data points nearest to
it are in. This algorithm is to identify the fingerprint it reads each fingerprint clustered graph
templates from the database and compares it with clustered input fingerprint graph templates.
This algorithm works by looking at one point on a grid, trying to determine if a point is in group
A or B, looks at the states of the points that are near it. The range is arbitrarily determined, but
the point is to take a sample of the data. If the majority of the points are in group A, then it is
likely that the data point in question will be A rather than B. (8)
15
3.6 Summary
In conclusion, this chapter describes the methodology for Fingerprint Authentication
for Examination Attendance using Arduino. The design of this system includes the framework,
flowchart and use case diagram. The algorithms that has been chosen is K-Nearest Neighbour
Minutiae Clustering.
16
CHAPTER 4
IMPLEMENTATION
4.1 Introduction
Implementation and testing are executed for ensuring the system are developed
according to user requirement. And it also a process of defining how the information system
should be built like physical system design. To achieve the main objective of the system, few
testing approaches have been done. These include unit testing, integration testing, and system
testing.
4.2 Interface Design
4.2.1 Login Form
Figure 4.2.1 shows the login interface. The users required to login before
he/she can access to the system. User required to insert their username and password
to login.
Figure 4.2.1 Login Form
17
4.2.2 Register Form
Figure 4.2.2 shows the register form. If users do not have an account, the users
need to register first. Users required to create a new account within insert their full
name, username, password, phone number, matric number and their email.
Figure 4.2.2 Register Form
18
4.3 Hardware
For this project, I use Keyestudio UNO R3 Advance and Fingerprint Sensor as main
hardwares. Keyestudio UNO compatible board Advanced is a microcontroller board based on
the ATmega328P, fully compatible with Keyestudio UNO R3 board and ARDUINO UNO
REV3. It has 14 digital input/output pins (of which 6 can be used as PWM outputs), 6 analog
inputs, a 16 MHz quartz crystal, a USB connection, a power jack, 2 ICSP headers and a reset
button.
Fingerprint sensor that I use in this project is This is an Arduino compatible fingerprint
module. With the high speed of DSP processor, it could also work with other serial device, like
MSP430, 51, AVR, PIC, STM32, ARM and FPGA device. This fingerprint module could work
alone without any principal computer or any PC software. This fingerprint had 6 wire which is
black, red, green, white, yellow and blue. But with Arduino board it only use 4 colour of wires.
First wire is red connected to 5V port, black wire was connected to GND (ground) port, white
wire was connected to number 3 port and green wire was connected number 2 port.
Figure 4.3.1
19
Figure 4.3.2 Implement of Keyestudio Arduino with Fingerprint Sensor
20
4.4 Software
4.4.1 Arduino IDE Software
Figure 4.4.1.1 Arduino IDE Icon
Arduino is an open-source electronics platform based on easy-to-use hardware and
software. Arduino boards are able to read inputs for example light on a sensor and scan a finger
on a fingerprint sensor. I can tell the board what to do by sending a set of instructions to the
microcontroller on the board. To do so I use the Arduino programming language (based on
Wiring), and the Arduino Software (IDE), based on Processing. It contains a text editor for
writing code, a message area, a text console, a toolbar with buttons for common functions and
a series of menus. It connects to the Arduino and Genuino hardware to upload programs and
communicate with them.
21
Figure 4.4.1.2 Library manager in Arduino IDE
After install the Arduino software IDE in my Laptop, I install the Adafruit Fingerprint
Sensor Library in the software.
22
Figure 4.4.1.3 Enrol coding
Next, insert the coding in the Arduino Software. This coding to connect Arduino board
with Fingerprint sensor. This coding also for fingerprint sensor and Arduino to take image of
fingerprint for the first time and then will save to the library.
23
Figure 4.4.1.4 Output for enrol coding
Next, I upload or run the coding of enrol in Arduino Software. User need to insert any
number as no ID that user want to save their fingerprint.
24
Figure 4.4.1.5 Fingerprint or matching fingerprint coding
Next, I insert the coding for fingerprint matching. The coding will require user to scan
their fingerprint and then will compare the fingerprint with the fingerprint library. Then, the
coding will show the confidence of fingerprint match as output.
25
Figure 4.4.1.6
After I run or upload the fingerprint coding, it will show this at my Arduino Software.
It says “sensor contains 19 templates of fingerprints in library. Then it will show fingerprint
confidence after I scan my fingerprint.
26
4.4.2 PLX-DAQ Tool
Figure 4.4.2 PLX-DAQ control
In this system, PLX-DAQ application software called parallax microcontroller data
acquisition add-on tool is used to display the output of controller in Excel sheet. When PLX-
DAQ software is opened, Excel sheet is automatically opened. After that, it is needed to connect
PLX-DAQ with Arduino with the suitable baud rate of 9600bps and com port. Any of
microcontrollers connected to any sensor can now send data directly into Excel using the serial
port of a PC with PLX-DAQ.
4.5 Summary
As a conclusion, this chapter briefly discussed about the implementation of code,
interface design of the system. In order to make the system functioning properly. The main
process and modules flow are discussed. The implementation has been done in prototype
model.
27
CHAPTER 5
RESULT AND ANALYSIS
5.1 Introduction
Fingerprint Authentication System for Examination Attendance is design completely
with fingerprint sensor and Arduino. This chapter is about result and analysis that I get from
the whole project have been done.
5.2 Result and Analysis
Figure 5.2 Result
28
Figure 5.3 Table of Analysis
Figure 5.2 shown the result of this project. First, the result show how many data of
fingerprint that I collect. The data were in library of Arduino Software. Next, when user scan
their fingerprint at fingerprint sensor, it will compare the fingerprint with the fingerprint in the
library. If fingerprint was matched, the result will show the ID of user that user register earlier.
Furthermore, the result shows the number confidence of fingerprint. The number of confidence
is same like the percentage of fingerprint matching. The higher number of confidence, the
higher the confidence, the similar the fingerprint is with the stored fingerprint.
29
Figure 5.3 shown the analysis of this project. The analysis of this project was in excel.
This is the output of Arduino that display in Excel sheet. When PLX-DAQ software is opened,
Excel sheet is automatically opened. After that, it is needed to connect PLX-DAQ with Arduino
with the suitable baud rate of 9600bps and com port. The Arduino connected to sensor can now
send data directly into Excel using the serial port of a PC with PLX-DAQ.
5.4 Summary
As a conclusion, this chapter briefly discussed about the implementation of code,
interface design and testing of the system. In order to make the system functioning properly.
30
CHAPTER 6
SUMMARY
6.1 Introduction
This chapter will discuss a conclusion of this project and the content on this
chapter are summary for the whole of this project, project contribution, project
limitation and some suggestion for the future.
6.2 Project Contribution
This system is developed to provide convenience to the user focusing on
student and lecturer in recording an attendance in the most sufficient way. Fingerprint
Authentication System technique is used to ensure that the attendance is
taken precisely and to reduce cheating issues. Without Fingerprint Authentication technology,
attendance can also be taken in many other ways however there are pros and
cons in each technique.
6.3 Project Constraints
Generally, project constraint and limitation are something about obstacles and limit of
the system. Before the objective of development of Fingerprint Authentication System for
Examination Attendance almost achieved, there are few constraints like failing in time
management for building the application. Too much time was spent on other where else and I
could rely on catch up the entire task in really late time.
31
6.4 Future Works
In the future, there are still a lot of features can be added into this system. First, this
system need combine with face recognition or voice recognition. Hence, it will be more secure
and more effective in combating the crime of examination. Next, this system can be enhanced
by adding more information about the student’s details and subject details. In addition, this
system can be practice and use in other situation not only in examination for attendance.
6.5 Summary
This project has introduced advance era for class management system and security
through IoT to make human life easier and luxuries. It is found that the Fingerprint
Authentication System is suitable for Attendance System where it can record an attendance
based on the conditions set. The project successfully managed to optimize light automation
activity by providing the user with more control over its usage levels.
32
References
1. Devikar, P., Krishnamoorthy, A., Bhanage, A., & Chauhan, M. S. (2016).
IoT based biometric attendance system. Int. J. Adv. Res. Comput.
Commun, 5.
2. Krishnamurthi, K., Mary, S. I., Sumalatha, B. N., & Pereira, A. (2015).
Fingerprint based attendance system. International Journal of Advanced
Research in Computer and Communication Engineering, 4(3), 621-623.
3. Kanse, S., Shaikh, M., Gadhari, S., Labde, P., & Gawande, A. Biometric
Student Attendance System using IoT.
4. Rao, B. V., Chaitanya, P. A. V. S. K., & ruchitha Reddy, A. SMART
DOOR UNLOCK SYSTEM USING FINGERPRINT.
5. Folaponmile, A., Okpe, J. B., & Gwani, Y. J. STUDENT EXAMINATION
ATTENDANCE AUTHENTICATION SYSTEM (SEAAS).
6. Alshbtat, A., Alfraheed, M., & Zanoon, N. (2019). A Novel Secure
Fingerprint-based Authentication System for Student’s Examination
System. Editorial Preface From the Desk of Managing Editor…, 10(9).
7. San Myint, K., & Nyein, C. M. M. Fingerprint Based Attendance System
Using Arduino.
8. Kanjan, N., Patil, K., Ranaware, S., & Sarokte, P. (2017). A Comparative
Study of Fingerprint Matching Algorithms.
33
9. Bistarelli, S., Santini, F., & Vaccarelli, A. (2005, July). An asymmetric
fingerprint matching algorithm for java card TM. In International
Conference on Audio-and Video-Based Biometric Person
Authentication (pp. 279-288). Springer, Berlin, Heidelberg.
10. Iancu, I., Constantinescu, N., & Colhon, M. (2010). Fingerprints
identification using a fuzzy logic system. International Journal of
Computers Communications & Control, 5(4), 525-531.