muhammad fairul aiman bin shafiei

42
i FINGERPRINT AUTHENTICATION SYSTEM FOR EXAMINATION ATTENDANCE MUHAMMAD FAIRUL AIMAN BIN SHAFIEI BACHELOR OF COMPUTER SCIENCE (COMPUTER NETWORK SECURITY) WITH HONOURS UNIVERSITI SULTAN ZAINAL ABIDIN 2019

Upload: others

Post on 07-Apr-2022

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

i

FINGERPRINT AUTHENTICATION SYSTEM FOR

EXAMINATION ATTENDANCE

MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

BACHELOR OF COMPUTER SCIENCE

(COMPUTER NETWORK SECURITY) WITH HONOURS

UNIVERSITI SULTAN ZAINAL ABIDIN

2019

Page 2: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

i

DECLARATION

I hereby declare that this report is based on my original work except for quotations and

citations, which have been duly acknowledged. I also declare that it has not been previously or

concurrently submitted for any other degree at University Sultan Zainal Abidin or other

institutions.

____________________________________

Name : Muhammad Fairul Aiman bin Shafiei

Date : ………………………………………..

Page 3: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

ii

CONFIRMATION

This is to confirm that the project of Fingerprint Authentication System for Attendance

System was prepared and submitted by Muhammad Fairul Aiman bin Shafiei (Matric Number

BTBL17046876) and has been found satisfactory in terms scope, quality and presentation as

partial fulfilment of the requirement for the bachelor of Computer science (Computer Network

Security) with Honour in University Sultan Zainal Abidin.

The research conducted and the writing of this report was under my supervision.

__________________________________

Supervisor : Cik Nazirah binti Abd Hamid

Date : …………………………………….

Page 4: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

iii

DEDICATION

First of all, all praised to Allah, the most Gracious and most Merciful for giving me the

opportunity to undergo this final year project Fingerprint Authentication System for

Attendance Examination.

I would like to thank my family, my parent and to my brothers and sister for supporting

me spiritually and giving me strength throughout writing this thesis and my life in general. my

friends who believed that they can finish the study despite of all the struggles, depression, and

stress we experienced in the making of our final year project.

I also would like to thanks my supervisor Cik Nazirah binti Abd Hamid for giving me

help and support throughout this project. I also would like to thanks my fellow friends who

believed that they can finish the study despite of all the struggles, depression, and stress we

experienced in the making of our final year project. I also want to express my gratitude to my

other lecturers that have help me in completing my project.

Page 5: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

iv

ABSTARCT

Biometric techniques have becoming a popular alternative and a reliable means of

identification that can support the evolving incredibly powerful computing. Currently,

universities or institutions still using old fashioned ways to authenticate students before taking

examination. Students must bring exam slip to the hall as their attendance and if the students

forget to bring their slip, they can’t take the exam. Moreover, many students would not or forget

to write down their matric number and exam’s information. In the other hand, the process of

taking students’ attendance manually is a difficult task as well as can consume a lot of time.

The aim of this project is to design and implement fingerprint authentication for examination

attendances using Arduino. This system needs students to scan their fingerprints for

authentication purposes and for identification, the system recognizes an individual by

comparing his/her biometrics with every record in the database. In conclusion, this system can

replace traditional identification and authentication of a student for examination attendance and

can reduce human errors.

Page 6: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

v

ABSTRAK

Teknik biometrik telah menjadi alternatif yang popular dan salah satu cara mengenal

pasti yang boleh dipercayai yang dapat menyokong pengkomputeran yang sangat berkuasa.

Pada masa ini, universiti atau institusi masih menggunakan cara lama untuk mengesahkan

pelajar sebelum mengambil peperiksaan. Pelajar mesti membawa slip peperiksaan ke dewan

sebagai kehadiran mereka dan jika pelajar lupa membawa slip mereka, mereka tidak boleh

mengambil peperiksaan. Selain itu, ramai pelajar tidak boleh atau lupa menulis nombor matrik

mereka dan maklumat peperiksaan. Sebaliknya, proses mengambil kehadiran pelajar secara

manual adalah tugas yang sukar dan boleh mengambil banyak masa. Tujuan projek ini adalah

untuk mereka bentuk dan melaksanakan pengesahan cap jari untuk kehadiran peperiksaan

menggunakan Arduino. Sistem ini memerlukan pelajar untuk mengimbas cap jari mereka untuk

tujuan pengesahan dan untuk pengenalpastian, sistem mengiktiraf individu dengan

membandingkan biometriknya dengan setiap rekod dalam pangkalan data. Sebagai

kesimpulan, sistem ini boleh menggantikan pengenalan tradisional dan pengesahan pelajar

untuk kehadiran pemeriksaan dan dapat mengurangkan kesilapan manusia.

Page 7: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

vi

TABLE OF CONTENT

PAGE

DECLARATION i

CONFIRMATION ii

DEDICATION iii

ABSTRACT iv

ABSTRAK v

CONTENTS vi

LIST OF FIGURES vii

CHAPTER I INTRODUCTION

1.1 INTRODUCTION 1

1.2 PROBLEM STATEMENT 2

1.3 OBJECTIVE 2

1.4 PROJECT SCOPE 3

1.5 THESIS ORGANIZATION 4

CHAPTER II LITERATURE REVIEW

2.1 INTRODUCTION 5

2.2 FINGERPRINT-BASED

USER AUTHENTICATION

6

2.3 ARDUINO

MICROCONTROLLER

6

2.4 FINGERPRINT MODULE 6

2.5 RELATED WORKS 7

2.6 VERIFY ALGORITHM 9

2.7 SUMMARY 10

CHAPTER III METHODOLOGY

3.1 INTRODUCTION 11

3.2 FRAMEWORK 11

3.3 FLOWCHART 12

3.3.1 FLOWCHART FOR

AUTHENTICATION

13

3.3.2 FLOWCHART FOR

REGISTER

14

USE CASE DIAGRAM 15

3.4 VERIFY ALGORITHM 16

3.5 3.6.1 K-NEAREST

NEIGHBOUR

MINUTIAE CLUSTERING

17

3.6

SUMMARY

18

Page 8: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

vii

CHAPTER 4

4.1

4.2

4.3

4.4

4.5

CHAPTER 5

5.1

5.2

5.3

CHAPTER 6

6.1

6.2

6.3

6.4

6.5

IMPEMENTATION

INTRODUCTION

INTERFACE DESIGN

4.2.1 LOGIN FORM

4.4.2 REGISTER FORM

HARDWARE

SOFTWARE

4.4.1 ARDUINO IDE

SOFTWARE

4.4.2 PLX-DAQ TOOL

SUMMARY

RESULT AND

ANALYSIS

INTRODUCTION

RESULT AND ANALYSIS

SUMMARY

SUMMARY

INTRODUCTION

PROJECT CONTRIBUTION

PROJECT CONSTRAINT

FUTURE WORKS

SUMMARY

REFERENCES

16

16

16

17

18

20

20

26

26

27

27

29

30

30

30

31

31

32

Page 9: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

viii

LIST OF FIGURES

FIGURE TITLE PAGE

Figure 2.3 Arduino Microcontroller 6

Figure 2.4 Fingerprint module 7

Figure 3.2 Framework 12

Figure 3.3.1 Flowchart for Authentication 13

Figure 3.3.2 Flowchart for Register 14

Figure 3.4

Figure 4.2.1

Figure 4.2.2

Figure 4.3.1

Figure 4.3.2

Figure 4.4.1

Figure 4.4.1.2

Figure 4.4.1.3

Figure 4.4.1.4

Figure 4.4.1.5

Figure 4.4.1.6

Figure 4.4.2

Figure 5.2

Figure 5.3

Use Case Diagram

Login Form

Register Form

Implement of Keyestudio Arduino

Arduino IDE Icon

Library manager in Arduino

Enrol Coding

Output of enrol coding

Fingerprint or Matching coding

PLX-DAQ tool

Result

Table of analysis

15

16

17

18

19

20

21

22

23

24

25

26

27

28

Page 10: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

1

CHAPTER 1

INTRODUCTION

1.1 Background

Biometric techniques have become a popular alternative and a reliable means of

identification that can support the evolving incredibly powerful computing. The process to

allow students to sit for an exam was by providing an identity medium such as ID cards.

Currently, universities or institutions still using old fashioned ways. Students still bring exam

slip to the hall as their attendance. Hence, students always forgot to bring their exam slip and

they can’t take the exam. Moreover, without fingerprint as examination attendances, many

students not or forgot to write down their matric number and information. In the other hand,

taking student attendance manually and maintaining it for a long time is a difficult task as well

as wastes a lot of time.

The work aim is to design and implement Fingerprint authentication for examination

attendances using Arduino. This system just needs students to scan their fingerprints for

authentication purposes. In identification, the system recognizes an individual by comparing

his/her biometrics with every record in the database. In conclusion, this system can also reduce

the time for to student to make an attendance process during the examination and this system

can replace traditional identification and authentication of a student.

Page 11: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

2

1.2 Problem Statement

The problems that occurs for this application to develop are universities or institutions

are still implementing traditional way to record attendance for examination by using pen and

paper. Next, a student must always bring relevant identification such as identity card and exam

slip to the exam and he/she will be prevented from taking the exam if he/she forget to bring

those items. Furthermore, the process of taking students’ attendance manually is a difficult task

as human can make mistake as well as the process can consume a lot of time.

1.3 Objectives

The objectives of this project are :

• The main objectives for this project are to design a fingerprint

authentication system for examination attendance.

• Next, to implement the fingerprint authentication system for

examination attendance using Arduino.

• Lastly, to test and evaluate the functionality of the system.

1.4 Project Scope

The scopes for this project are to make the system development process easier. The

scope of this project is divided into two which are the admin scope and student scope. First

point of admin scope is the system requires the admin to register their information. Next, the

admin can view the students’ attendance and produce reports and admin can easily analyse the

information regarding the student attendance. Furthermore, the point of student scope are the

system requires the students to register their information and students scan their fingerprints

for the examination attendance.

Page 12: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

3

1.5 Thesis Organization

This thesis contains all the information necessary for this study. In Chapter 1, this report

covers project initiation where information on project priorities, scopes, and also project

restriction. In Chapter 2, the article deals primarily with previous research that has been

used as sources for this project.

Chapter 3 is about this project's methodology Each chapter describes the project's

structure and function, and all the information about the software and hardware used to

produce the results by this project. Chapter 4 consists of architecture and simulation to

demonstrate how the biometric use of the fingerprint authentication template functions.

The program design and monitoring will be addressed in chapter 5. Eventually, the

research and the consequence of the experiment and the support of this study are

summarized in Chapter 6.

Page 13: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

4

CHAPTER 2

LITERATURE REVIEW

2.1 Introduction

A number of related works exist in the literature on the application of different

information technology tools to student attendance management problems. This chapter

would discuss and describe selected research papers and previous journals that trace similar

techniques and topics that can be referenced for Fingerprint-based user authentication for

examination attendance using Arduino. This chapter also provides research-based on some

comparison between the techniques used among the system that can be used to develop this

system. [7]

2.2 Fingerprint-based user authentication

The biometric method is the identification system in which the person's physical or

behavioural attribute is used to establish the identity of persons. Recognition of fingerprints

works by identifying individuals using their physical structure through the impression of

the minute ridge structures found on each person's fingertips. [7]

The most common biometric methods used are fingerprint-based recognition. It has

been used effectively in various applications, including in the ATM, for validation at the

airport, and many more. There are two methods for matching fingerprints, which are based

Page 14: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

5

on minutiae and similarity. Mapping minute areas on a fingerprint is used in the minute-

based technique. [6]

2.3 Arduino Microcontroller

Arduino is an open-source electronic that is widely used nowadays. Nowadays, Arduino

is widely selected as it is straightforward, simple to discover, inexpensive, and on Arduino

there is a huge amount of guide on the internet. Using a USB connection, it can connect

with other devices. In addition, power supply or AC to DC connector can also be used.

Arduino can be programmed using Arduino programming language which can be

downloaded free from the internet. (7)

Figure 2.3 Arduino Microcontroller

2.4 Fingerprint Module

This system uses an electronic fingerprint sensor. This detector detects the sequence of

fingerprints. The image of the scan is converted and saved in memory as a model. This

fingerprint sensor automatically sends data packets to capture images based on the principle

of glass layer ray reflection. Once the fingerprint is captured, it is possible to detect and

search. CCD- Camera is used in the optical fingerprint sensor as a set of light-sensitive

Page 15: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

6

LED. It will take a fingerprint photo once the digit is put on the fingerprint reader’s glass

plate. (7)

Figure 2.4 Fingerprint Module

2.5 Related Works

Based on the research, a few systems that similarly to the proposed project were found.

Firstly, Fingerprint Based Attendance System Using Arduino. This work was to simplify

the attendance system using Fingerprint Base Attendance System Using Arduino. In this

system, there were three main parts: enrolling, searching and displaying the attendance.

This simple device started with Arduino's connection with the fingerprint sensor to the

enrolling computer. In the search phase, as soon as the user pressed the fingerprint reader,

it read the user's fingerprint and based on the instructions written in, the user's details were

displayed on the computer. The time, date, username and ID number of the scanning system

were shown on the computer. Microsoft Excel was used in this system to show the

information. PLX-DAQ is a useful tool to connect the Arduino with Excel [7].

Page 16: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

7

The second system was the IoT Based Biometric Attendance System. This article

discussed the biometric attendance system that integrated an ESP8266 NodeMCU breakout

board and a fingerprint scanner. The fingerprint scanner processed the user’s fingerprint to

verify the student’s attendance. NodeMCU uploaded the attendance data to Google

Spreadsheet using a service called PushingBox API. Fingerprint processing had three

primary functions: enrolment, searching, and verification. Out of these, enrolment played

an important role. It involved capturing an image of the user’s fingerprint. Searching

involved examining through a set of stored fingerprints and comparing them with the input

fingerprint. Verification involved acknowledging a match between the input fingerprint and

one already presented in the stored fingerprints. The identification of fingerprints of

individuals was done on the basis of both hardware and software techniques. [7]

The third system was the Student Examination Attendance Authentication System

(SEAAS). The article discussed the fingerprint sensor, Arduino UNO board, a Bluetooth

device, a mobile phone to design a prototype that can be used for students’ authentication

for examination purposes thereby preventing impersonation in exams. The button on the

SEAAS was first switched on in order to register a participant, the mobile device software

downloaded on the android phone was enabled. The Bluetooth was switched on from the

app and connected to the HC-05 listed on the android phone as part of the list of Bluetooth

devices. The information of the student such as name and number of the matriculation were

then entered and stored on the mobile device. The record of the saved student could be

accessed on the device from the ' show attendance ' section. The thumb was simply placed

on the fingerprint scanner to document a student's presence and the outcome would be

shown correctly. [1]

Page 17: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

8

2.6 Verification Algorithms

K-Nearest Neighbour Minutiae Clustering is one of algorithm that I use in this project.

Fingerprint search is optimized by clustering fingerprint graph feature. The graph shows the

feature of fingerprint and edges represents minutiae. Hence, the clustering of graph information

is done by K-NN clustering algorithm based on Euclidean range between the vertices of the

graph. It is the simplest clustering algorithm. To identify the fingerprint, it reads each

fingerprint clustered graph templates from database and compares it. This continues till the

input fingerprint is matched with fingerprint stored in database otherwise no match found

returns. However, this technique will increase the processing time. [7]

2.7 Summary

This chapter gives an overview of the system concept. Based on the research

conducted, it demonstrates that literature review is one of the important elements as we can

use the new and established process methodology to improve our proposed system. On the

basis of previous articles and reviews, the methodology is selected.

Page 18: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

9

CHAPTER 3

METHODOLOGY

3.1 Introduction

The methodology is known as a set of procedures. This chapter will cover the methods

used to build this program. From problem analysis to a system designed to achieve the goals

of the project mentioned earlier in this research report. In fact, this approach is an important

part of ensuring the successful completion of the process.

3.2 Framework

Framework is broad overview, outline or skeleton of interlinked items which supports

a particular approach to a specific objective, and serves as a guide that can be modified as

required by adding or deleting items.

Page 19: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

10

Figure 3.2 Framework

Based on Figure 3.2, firstly user need to register with inserting their name and ic number. User

also need to scan their fingerprint for the first time and the system will save it in the database. The next

step is for authentication. User need to log in with enter their username and scan their fingerprint. Next

the system will match the user fingerprint with the fingerprint in the database. Thus, the system will

send result either the fingerprint is matching or not.

3.3 Flowchart

A flow chart is a description of a method graphically or symbolically. That stage of

the process is defined by another symbol which provides a brief description of the step of the

process. The icons of the flow chart are connected with arrows indicating the course of the

stream flow.

Page 20: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

11

3.3.1 Flowchart for Authentication

Figure 3.3.1 Flowchart for Authentication

Based on Figure 3.3.1, user need to scan their fingerprint. If fingerprint module found

in database, scan the finger image. If no fingerprint module found, user need to scan the

fingerprint again for the first time. Next, if the fingerprint matched, system will display the

current date, name and matric number in Excel. If fingerprint not matched, system will scan

the finger image again.

Page 21: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

12

3.3.2 Flowchart for Register

YES

NO

Figure 3.3.2 Flowchart for Register

Based on Figure 3.3.2, user need to insert name and IC number for registration. Next,

user also need to scan their fingerprint for the first time. If user want to scan their fingerprint

again, user need to repeat from the early step. If user don’t want to take the next fingerprint,

the registration is success.

Start

Insert Name

and No IC

Scan

fingerprint for

First time

Take Next

Fingerprint

Stop

Page 22: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

13

3.4 Use Case Diagram

The primary form of system / process specifications for a modern underdeveloped

software program is a UML usage case diagram. Usage cases define the action anticipated

(what) and not the actual process (how) to make it happen. It is possible to denote both textual

and visual representation (i.e. use case diagram) using cases once specified. A central idea of

case modelling is that it helps us to design a system from the point of view of the end user. It

is an effective communication strategy regarding system activity in terms of the consumer by

identifying all externally visible machine behaviour.

User Admin

Figure 3.4 Use Case Diagram

Register

Scan

Fingerprint

Log In

Review

Attendance

Page 23: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

14

Based on Figure 3.4, there are two actor which is user and admin. User can register, log

in and scan fingerprint but can’t review attendance. Hence admin can register, log in and review

attendance but can’t scan fingerprint.

3.5 Verification Algorithm

As the aim of this project is to design a fingerprint authentication system for

examination attendance, fingerprint authentication makes use of the image and the physical

characteristics. In this project, matching algorithm is used for fingerprint authentication.

3.5.1 K-Nearest Neighbour Minutiae Clustering

K-Nearest Neighbour Minutiae Clustering is a k-nearest-neighbour algorithm, often

abbreviated k-NN, is an approach to data classification that estimates how likely a data point

is to be a member of one group or the other depending on what group the data points nearest to

it are in. This algorithm is to identify the fingerprint it reads each fingerprint clustered graph

templates from the database and compares it with clustered input fingerprint graph templates.

This algorithm works by looking at one point on a grid, trying to determine if a point is in group

A or B, looks at the states of the points that are near it. The range is arbitrarily determined, but

the point is to take a sample of the data. If the majority of the points are in group A, then it is

likely that the data point in question will be A rather than B. (8)

Page 24: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

15

3.6 Summary

In conclusion, this chapter describes the methodology for Fingerprint Authentication

for Examination Attendance using Arduino. The design of this system includes the framework,

flowchart and use case diagram. The algorithms that has been chosen is K-Nearest Neighbour

Minutiae Clustering.

Page 25: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

16

CHAPTER 4

IMPLEMENTATION

4.1 Introduction

Implementation and testing are executed for ensuring the system are developed

according to user requirement. And it also a process of defining how the information system

should be built like physical system design. To achieve the main objective of the system, few

testing approaches have been done. These include unit testing, integration testing, and system

testing.

4.2 Interface Design

4.2.1 Login Form

Figure 4.2.1 shows the login interface. The users required to login before

he/she can access to the system. User required to insert their username and password

to login.

Figure 4.2.1 Login Form

Page 26: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

17

4.2.2 Register Form

Figure 4.2.2 shows the register form. If users do not have an account, the users

need to register first. Users required to create a new account within insert their full

name, username, password, phone number, matric number and their email.

Figure 4.2.2 Register Form

Page 27: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

18

4.3 Hardware

For this project, I use Keyestudio UNO R3 Advance and Fingerprint Sensor as main

hardwares. Keyestudio UNO compatible board Advanced is a microcontroller board based on

the ATmega328P, fully compatible with Keyestudio UNO R3 board and ARDUINO UNO

REV3. It has 14 digital input/output pins (of which 6 can be used as PWM outputs), 6 analog

inputs, a 16 MHz quartz crystal, a USB connection, a power jack, 2 ICSP headers and a reset

button.

Fingerprint sensor that I use in this project is This is an Arduino compatible fingerprint

module. With the high speed of DSP processor, it could also work with other serial device, like

MSP430, 51, AVR, PIC, STM32, ARM and FPGA device. This fingerprint module could work

alone without any principal computer or any PC software. This fingerprint had 6 wire which is

black, red, green, white, yellow and blue. But with Arduino board it only use 4 colour of wires.

First wire is red connected to 5V port, black wire was connected to GND (ground) port, white

wire was connected to number 3 port and green wire was connected number 2 port.

Figure 4.3.1

Page 28: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

19

Figure 4.3.2 Implement of Keyestudio Arduino with Fingerprint Sensor

Page 29: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

20

4.4 Software

4.4.1 Arduino IDE Software

Figure 4.4.1.1 Arduino IDE Icon

Arduino is an open-source electronics platform based on easy-to-use hardware and

software. Arduino boards are able to read inputs for example light on a sensor and scan a finger

on a fingerprint sensor. I can tell the board what to do by sending a set of instructions to the

microcontroller on the board. To do so I use the Arduino programming language (based on

Wiring), and the Arduino Software (IDE), based on Processing. It contains a text editor for

writing code, a message area, a text console, a toolbar with buttons for common functions and

a series of menus. It connects to the Arduino and Genuino hardware to upload programs and

communicate with them.

Page 30: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

21

Figure 4.4.1.2 Library manager in Arduino IDE

After install the Arduino software IDE in my Laptop, I install the Adafruit Fingerprint

Sensor Library in the software.

Page 31: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

22

Figure 4.4.1.3 Enrol coding

Next, insert the coding in the Arduino Software. This coding to connect Arduino board

with Fingerprint sensor. This coding also for fingerprint sensor and Arduino to take image of

fingerprint for the first time and then will save to the library.

Page 32: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

23

Figure 4.4.1.4 Output for enrol coding

Next, I upload or run the coding of enrol in Arduino Software. User need to insert any

number as no ID that user want to save their fingerprint.

Page 33: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

24

Figure 4.4.1.5 Fingerprint or matching fingerprint coding

Next, I insert the coding for fingerprint matching. The coding will require user to scan

their fingerprint and then will compare the fingerprint with the fingerprint library. Then, the

coding will show the confidence of fingerprint match as output.

Page 34: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

25

Figure 4.4.1.6

After I run or upload the fingerprint coding, it will show this at my Arduino Software.

It says “sensor contains 19 templates of fingerprints in library. Then it will show fingerprint

confidence after I scan my fingerprint.

Page 35: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

26

4.4.2 PLX-DAQ Tool

Figure 4.4.2 PLX-DAQ control

In this system, PLX-DAQ application software called parallax microcontroller data

acquisition add-on tool is used to display the output of controller in Excel sheet. When PLX-

DAQ software is opened, Excel sheet is automatically opened. After that, it is needed to connect

PLX-DAQ with Arduino with the suitable baud rate of 9600bps and com port. Any of

microcontrollers connected to any sensor can now send data directly into Excel using the serial

port of a PC with PLX-DAQ.

4.5 Summary

As a conclusion, this chapter briefly discussed about the implementation of code,

interface design of the system. In order to make the system functioning properly. The main

process and modules flow are discussed. The implementation has been done in prototype

model.

Page 36: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

27

CHAPTER 5

RESULT AND ANALYSIS

5.1 Introduction

Fingerprint Authentication System for Examination Attendance is design completely

with fingerprint sensor and Arduino. This chapter is about result and analysis that I get from

the whole project have been done.

5.2 Result and Analysis

Figure 5.2 Result

Page 37: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

28

Figure 5.3 Table of Analysis

Figure 5.2 shown the result of this project. First, the result show how many data of

fingerprint that I collect. The data were in library of Arduino Software. Next, when user scan

their fingerprint at fingerprint sensor, it will compare the fingerprint with the fingerprint in the

library. If fingerprint was matched, the result will show the ID of user that user register earlier.

Furthermore, the result shows the number confidence of fingerprint. The number of confidence

is same like the percentage of fingerprint matching. The higher number of confidence, the

higher the confidence, the similar the fingerprint is with the stored fingerprint.

Page 38: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

29

Figure 5.3 shown the analysis of this project. The analysis of this project was in excel.

This is the output of Arduino that display in Excel sheet. When PLX-DAQ software is opened,

Excel sheet is automatically opened. After that, it is needed to connect PLX-DAQ with Arduino

with the suitable baud rate of 9600bps and com port. The Arduino connected to sensor can now

send data directly into Excel using the serial port of a PC with PLX-DAQ.

5.4 Summary

As a conclusion, this chapter briefly discussed about the implementation of code,

interface design and testing of the system. In order to make the system functioning properly.

Page 39: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

30

CHAPTER 6

SUMMARY

6.1 Introduction

This chapter will discuss a conclusion of this project and the content on this

chapter are summary for the whole of this project, project contribution, project

limitation and some suggestion for the future.

6.2 Project Contribution

This system is developed to provide convenience to the user focusing on

student and lecturer in recording an attendance in the most sufficient way. Fingerprint

Authentication System technique is used to ensure that the attendance is

taken precisely and to reduce cheating issues. Without Fingerprint Authentication technology,

attendance can also be taken in many other ways however there are pros and

cons in each technique.

6.3 Project Constraints

Generally, project constraint and limitation are something about obstacles and limit of

the system. Before the objective of development of Fingerprint Authentication System for

Examination Attendance almost achieved, there are few constraints like failing in time

management for building the application. Too much time was spent on other where else and I

could rely on catch up the entire task in really late time.

Page 40: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

31

6.4 Future Works

In the future, there are still a lot of features can be added into this system. First, this

system need combine with face recognition or voice recognition. Hence, it will be more secure

and more effective in combating the crime of examination. Next, this system can be enhanced

by adding more information about the student’s details and subject details. In addition, this

system can be practice and use in other situation not only in examination for attendance.

6.5 Summary

This project has introduced advance era for class management system and security

through IoT to make human life easier and luxuries. It is found that the Fingerprint

Authentication System is suitable for Attendance System where it can record an attendance

based on the conditions set. The project successfully managed to optimize light automation

activity by providing the user with more control over its usage levels.

Page 41: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

32

References

1. Devikar, P., Krishnamoorthy, A., Bhanage, A., & Chauhan, M. S. (2016).

IoT based biometric attendance system. Int. J. Adv. Res. Comput.

Commun, 5.

2. Krishnamurthi, K., Mary, S. I., Sumalatha, B. N., & Pereira, A. (2015).

Fingerprint based attendance system. International Journal of Advanced

Research in Computer and Communication Engineering, 4(3), 621-623.

3. Kanse, S., Shaikh, M., Gadhari, S., Labde, P., & Gawande, A. Biometric

Student Attendance System using IoT.

4. Rao, B. V., Chaitanya, P. A. V. S. K., & ruchitha Reddy, A. SMART

DOOR UNLOCK SYSTEM USING FINGERPRINT.

5. Folaponmile, A., Okpe, J. B., & Gwani, Y. J. STUDENT EXAMINATION

ATTENDANCE AUTHENTICATION SYSTEM (SEAAS).

6. Alshbtat, A., Alfraheed, M., & Zanoon, N. (2019). A Novel Secure

Fingerprint-based Authentication System for Student’s Examination

System. Editorial Preface From the Desk of Managing Editor…, 10(9).

7. San Myint, K., & Nyein, C. M. M. Fingerprint Based Attendance System

Using Arduino.

8. Kanjan, N., Patil, K., Ranaware, S., & Sarokte, P. (2017). A Comparative

Study of Fingerprint Matching Algorithms.

Page 42: MUHAMMAD FAIRUL AIMAN BIN SHAFIEI

33

9. Bistarelli, S., Santini, F., & Vaccarelli, A. (2005, July). An asymmetric

fingerprint matching algorithm for java card TM. In International

Conference on Audio-and Video-Based Biometric Person

Authentication (pp. 279-288). Springer, Berlin, Heidelberg.

10. Iancu, I., Constantinescu, N., & Colhon, M. (2010). Fingerprints

identification using a fuzzy logic system. International Journal of

Computers Communications & Control, 5(4), 525-531.