You are on page 1of 61

1A-B212-20: ATTENDANCE MANAGEMENT SYSTEM BY USING FINGERPRINT RECOGNITION

AHMAD AIZUDDIN BIN MOHD RASHDI 50207111193

BACHELOR OF ENGINEERING TECHNOLOGY (HONS) IN ROBOTICS

UNIVERSITI KUALA LUMPUR JANUARY 2013

DECLARATION PAGE

We declare that this report is our original work and all references have been cited adequately as required by the University.

Date: ____/______/_____

Signature: . Full Name: Ahmad Aizuddin Bin Mohd Rashdi ID No. : 50207111193

APPROVAL PAGE

We have examined this report and verify that it meets the program and Universitys requirements for the Bachelor of Engineering Technology in Mechatronics.

Date: ___/______/_____

Signature: . Supervisors Name: Mr. Sazly Bin Anuar Official Stamp:

Date: ___/______/_____

Signature: . Co-Supervisors Name: Mdm. Norazlin Binti Ibrahim Official Stamp:

ii

ACKNOWLEDGEMENT

Thanks to Allah SWT, with his willing gives us the strength and opportunity to complete this Final Year Project. Firstly, I would like to acknowledge the advice and guidance of our supervisor Mr. Sazly Bin Anuar. I also thank to our CoSupervisor Mdm. Norazlin Binti Ibrahim for their guidance and suggestions. The major materials for this project, were provided by UniKL MFI and we want to thanks to UniKL MFI for supporting us. I would like to thank my family members for supporting and encouraging me to pursue this project. Without my familys encouragement, I would not have finished the project.

iii

TABLE OF CONTENTS Page No. Title Page Declaration Approval Acknowledgement List of Figures List of Tables Abstract i ii iii vi vii viii

CHAPTER 1: INTRODUCTION ............................................................................................ 1 1.1 1.2 1.3 1.4 1.4.1 1.4.2 1.5 1.6 1.6.1 1.6.2 1.6.3 1.7 INTRODUCTION ................................................................................................... 1 BACKGROUND ..................................................................................................... 1 PROBLEM STATEMENT ...................................................................................... 3 OBJECTIVES .......................................................................................................... 4 To develop the students attendance system using Fingerprint Technology ... 4 To develop software for fingerprint identification and database to store students attendance records. ........................................................................... 4 PROJECT SCOPE ................................................................................................... 5 PROJECT SIGNIFICANCE .................................................................................... 6 Faculty ............................................................................................................. 6 Lecturers .......................................................................................................... 6 Students............................................................................................................ 6 CONCLUSION ........................................................................................................ 6

CHAPTER 2: LITERATURE REVIEW ................................................................................. 7 2.1 2.2 2.2.1 2.2.2 2.2.3 2.2.4 2.3 INTRODUCTION ................................................................................................... 7 BIOMETRICS ......................................................................................................... 7 IRIS .................................................................................................................. 8 FACIAL ........................................................................................................... 9 RETINAL ...................................................................................................... 11 FINGERPRINT ............................................................................................. 11 FINGERPRINT AUTHENTICATION ................................................................. 17 iv

2.4 2.4.1 2.4.2 2.4.3 2.5

FINGERPRINT PATTERN................................................................................... 18 Arch ............................................................................................................... 18 Loop ............................................................................................................... 18 Whorl ............................................................................................................. 18 CONCLUSION ...................................................................................................... 20

CHAPTER 3: RESEARCH METHODOLOGY ................................................................... 24 3.1 3.2 3.2.1 3.2.2 3.2.3 3.3 3.3.1 3.2.2 3.3.3 3.3.4 3.4 3.5 INTRODUCTION ................................................................................................. 24 COMPONENT OVERVIEW ................................................................................ 26 PIC16F876A .................................................................................................. 26 SN-FPR-UART .............................................................................................. 27 Interface LCD ................................................................................................ 27 HARDWARE DEVELOPMENT .......................................................................... 28 Power Supply ................................................................................................. 28 Push Button as Input for PIC microcontroller ............................................... 29 LED as output of PIC microcontroller ........................................................... 30 Ports for UART interface ............................................................................... 30 PROJECT REQUIREMENT ................................................................................. 33 CONCLUSION ...................................................................................................... 34

CHAPTER 4: RESULTS AND DISCUSSION ..................................................................... 35 4.1 4.2 4.3 INTRODUCTION ................................................................................................. 35 Testing PR29 PCB Board with SN-FPR-UART Fingerprint Reader (Without UC00A).................................................................................................................. 35 Testing PR29 PCB board with SN-FPR-UART Fingerprint Reader (With UC00A) 36

............................................................................................................................................... 37 CHAPTER 5: 5.1 5.2 CONCLUSION AND RECOMMENDATION ......................................... 39

CONCLUSION ...................................................................................................... 39 RECOMMENDATION ......................................................................................... 39

REFERENCES ...................................................................................................................... 40 APPENDIX A: FLOW CHART SEQUENCE OF ATTENDANCE MANAGEMENT SYSTEM BY USING FINGERPRINT RECOGNITION ..................................................... 41 APPENDIX B: CIRCUIT DIAGRAM .................................................................................. 51

LIST OF FIGURES Page No.


Figure 1: Fingerprint ................................................................................................................ 2 Figure 2: Iris ............................................................................................................................ 2 Figure 3: Facial ........................................................................................................................ 2 Figure 4: Retinal ...................................................................................................................... 2 Figure 5: Arch pattern ............................................................................................................ 19 Figure 6: Loop pattern ........................................................................................................... 19 Figure 7: Whorl pattern.......................................................................................................... 19 Figure 8: Flow of project ....................................................................................................... 24 Figure 9: System Overview ................................................................................................... 25 Figure 10: PIC16F876A......................................................................................................... 26 Figure 11: The way to scan the fingerprint ............................................................................ 27 Figure 12: Interface LCD (2 x 16 Characters) ....................................................................... 27 Figure 13: Schematic of Power Supply Diagram .................................................................. 29 Figure 14: Schematic of Push Button as input for PIC microcontroller ................................ 29 Figure 15: Schematic of LED as output of PIC microcontroller ........................................... 30 Figure 16: Schematic for ports UART interface .................................................................... 30 Figure 17: Soldering iron pin ................................................................................................. 31 Figure 18: Fully of PCB board .............................................................................................. 32 Figure 19: Soldering the board .............................................................................................. 32 Figure 20: PCB board with fingerprint reader (without UC00A) .......................................... 35 Figure 21: Illustrations of the connections............................................................................. 36 Figure 22: Connections for PCB-Fingerprint Reader-UC00A .............................................. 37 Figure 23: Illustration of the connection................................................................................ 37 Figure 24: Fingerprint Reader GUI Panel .............................................................................. 38 Figure 25: Fingerprint Reader GUI export attendance .......................................................... 38

vi

LIST OF TABLES

Page No.
Table 1: The advantage, disadvantage, and purpose of fingerprint pattern ........................... 20 Table 2: Pin Description ........................................................................................................ 28 Table 3: List of Component ................................................................................................... 33

vii

ABSTRACT

This project is about to develop a portable attendance monitoring system based on fingerprint identification that can be used to monitor attendance of student or staff. These projects utilize a portable fingerprint scanner as the input to acquire fingerprint image and the notebook or personal computer as the mobile terminal to process the images and record the attendance. When fingerprint is scan on fingerprint scanner, the fingerprint image will be send data into personal computer. This project is also need to develop a program that has fingerprint recognition and identification function as well as database store student or staff information and attendance records. In the database there will be a lot of information about the fingerprint pattern, fingerprint classification, fingerprint identification, fingerprint reference point and others. All of this match the input fingerprint images with the database.

viii

CHAPTER 1: INTRODUCTION
1.1 INTRODUCTION
This chapter will focus on background of this project, project that cause us to implement the project, the scope, and significance of the project. The objectives are also described in detail in this topic.

1.2

BACKGROUND
Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics. It includes fingerprint, iris, facial and retinal. As shown in figure 1, figure 2, figure 3, and figure 4. Biometrics technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. Today, biometric is being spotlighted as the authentication method because of the need for reliable security.

Fingerprint authentication has been in use for the longest time and bears more advantages than other biometrics. It has been verified through various applications. In 1924, Federal Bureau of Investigation (FBI) is already known to have maintained more than 250 million civil files of fingerprints for the purpose of criminal investigation and the identification of unknown casualties. It now is being used in numerous field including financial, medical, e-commerce and customer application as a secure and effective authentication method.

Figure 1: Fingerprint Figure 1.1: Fingerprint

Figure Iris Figure1.2: 2: Iris

Figure1.3: 3: Facial Figure Facial

Figure Figure1.4: 4: Retinal Retinal

1.3

PROBLEM STATEMENT
Traditionally, students attendance is taken manually by using attendance sheet given by lecturer in class and not a system. With this manual system, there are some cases that student can cheat by asking their friends to tick or sign for them. This occurs because the students just want to fulfill the 80% of the attendance so that they can seat for the final examination at the end of the semester. Lecturer cant monitor for all students in the class and it is difficult for lecturer to record the attendance of students accurately and efficiently. Lecturers are responsible to monitor the entire students attendance for the whole semester. For those students that fail to meet the 80% of their attendance rate will be given a reminder as a warning from faculty.

A system may be needed in order to records the attendance of the students more accurately without have to trace manually by lecturers. A fingerprint device will be provided at each class and laboratory at the faculty. This system will record the attendance of students in class when the class begins and at the end of class. This is to ensure that the students have attended the class until the lecture ended by the lecturer.

1.4

OBJECTIVES
In order to achieve our goal, there are objectives to be followed. The main objectives of this project are:

1.4.1 To develop the students attendance system using Fingerprint Technology The first objective is to develop the students attendance s ystem. This system will integrate with the fingerprint technology. This system will record the attendance of the students in class. This system also will provide the facilities to the faculty to access the information of the students easily. 1.4.2 To develop software for fingerprint identification and database to store students attendance records.

In this project we will develop software to keep the student attendance data. Students attendance data stored in the fingerprint recognition (hardware) will be transfer into the software developed.

1.5

PROJECT SCOPE
Firstly, identify the common problem that all always happen to the attendance system that is use in UniKL. Then, think a solution for that problem. There are a few method that can be used to upgrade the attendance system in UniKL. So, choose the best solution to that problem considering on cost, effectively of the hardware and how easy to use the system.

After considering the entire factor, choose to use fingerprint method as a solution to the attendance system problem in UniKL. The main reason choosing this method because all people have their own unique fingerprint patents that cannot be copy or same with other people and fingerprint is always carried by people wherever they go. So that there are no season for someone to give excuse if there are any problem with their attendance records.

In overall, scopes of work is to develop a software for fingerprint recognition and identification as well as database to store students information and attendance records using Visual Basic, net and the software will be integrated with portable fingerprint scanner to produce a portable attendance monitoring system.

1.6

PROJECT SIGNIFICANCE
The significance must be considered in every proposed system to ensure that the proposed system will provide more benefit to all parties especially the faculty. For this project, the significance has been identified. The significance can be categories into 3 groups. There are:

1.6.1

Faculty This significance of this system is mainly focusing for the UniKL itself. This is because this project will enhance the efficiency of the manual system. It also can reduce in term of paper usage and avoid human error. All activities are done by computer and technology.

1.6.2

Lecturers With this system, lecturer can record the attendance of their students in class easily. They also do not have to count the percentage of every student at the end of the semester.

1.6.3

Students As a user, students can motivate themselves to be more discipline and punctual.

1.7

CONCLUSION
In this chapter, it is discuss several important sections that related to the project. All these sections will be a guideline to complete the project successfully. It includes the explanations about background, problem statement, scope, objectives and significant of the project.

CHAPTER 2: LITERATURE REVIEW

2.1

INTRODUCTION
This chapter will focus on the review of related works. It will introduce the history of the technologies, the definition, the identification and verification, the fingerprint application, summary of biometric methodologies and also factors that cause the fingerprint systems to fail and explained the similar study before.

2.2

BIOMETRICS
According to Bowman, E (2000), biometric technologies are defined as automated methods of identifying or authenticating the identity of a living person based on a physiological or behavioral characteristic. Automated methods can be broken down into a mechanism used to scan, a processing or comparison unit and an interface with a variety of application systems. Identification refers to when characteristics are selected from a group of stored images; this produces a list of possible or likely matches. Authentication refers to the when an individual makes a claim that he or she is someone specific and just that one persons characteristics are being checked to see if they match. Bowman, E, also stated that physiological characteristic is a physical that does not change frequently such as fingerprint, hand silhouette, iris pattern or blood vessel pattern on the back of the eye. Behavioral characteristics are more of a reflection on physiological patterns such as signature, keystroke analysis and speech patterns. Biometric recognition or simply biometric refers to the automatics recognition individuals based on their physiological and/or behavioral characteristics Jain, A (2004). For example fingerprint, iris, voice. A biometric can be described as a measurable physical and/or behavioral trait that can be captured and used to
7

verify the identity of a person by computing the metric to a previously stored template, (Erikson, M, 2001). Biometric can be defined as the task of automatically recognizing a person using his/her distinguishing traits. The distinguishing traits refers to fingerprints, voice pattern, facial characteristics etc.

2.2.1

IRIS Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of the rides of an individual's eyes, whose complex random patterns are unique and can be seen from some distance. In 1987 two Ophthalmology Professors, Leonard Flom, M.D. (NYU) and Aran Safir,M.D.(U.Conn) et al, were issued a first of its kind, broad patent # 4,641,349 entitled "Iris Recognition Technology." Subsequently, John Daugman,PhD (Harvard Computer Science faculty) was then salaried by both ophthalmologists to write the algorithm for their concept based upon an extensive series of high resolution iris photos supplied to him by Dr.Flom from his volunteer private patients. Several years later, Daugman received a method patent for the algorithm and a crudely constructed prototype proved the concept. The three individuals then founded "IridianTechnologies,Inc." and assigned the Flom/Safir patent to that entity that was then capitalized by GE Capital, a branch of "GE"(General Electric) and other investors.

2.2.2

FACIAL

1964-1965 Bledsoe, Helen Chan et al (2000), worked on using the computer to recognize human faces. He was proud of this work, but because the funding was provided by an unnamed intelligence agency that did not allow much publicity, little of the work was published. Given a large database of images (in effect, a book of mug shots) and a photograph, the problem was to select from the database a small set of records such that one of the image records matched the photograph. The success of the method could be measured in terms of the ratio of the answer list to the number of records in the database. 1966 After Bledsoe left PRI in 1966, this work was continued at the Stanford Research Institute, primarily by Peter Hart. In experiments performed on a database of over 2000 photographs, the computer consistently outperformed humans when presented with the same recognition tasks (Bledsoe 1968). Peter Hart (1996) enthusiastically recalled the project with the exclamation, "It really worked!" 1997 The system developed by Christoph von der Malsburg and graduate students of the University of Bochum in Germany and the University of Southern California in the United States outperformed most systems with those of Massachusetts Institute of Technology and the University of Maryland rated next. The Bochum system was developed through funding by the United States Army Research Laboratory. The software was sold as ZN-Face and used by customers such as Deutsche Bank and operators of airports and other busy locations. The software was "robust enough to make identifications from less-than-perfect face views. It can
9

also often see through such impediments to identification as mustaches, beards, changed hair styles and glasseseven sunglasses". 2007 Image searches were "based on the text surrounding a photo," for example, if text nearby mentions the image content. Polar Rose technology can guess from a photograph, in about 1.5 seconds, what any individual may look like in three dimensions, and thought they "will ask users to input the names of people they recognize in photos online" to help build a database Identix, a company out of Minnesota, has developed the software, FaceIt. FaceIt can pick out someones face in a crowd and compare it to databases worldwide to recognize and put a name to a face. The software is written to detect multiple features on the human face. I can detect the distance between the eyes, width of the nose, shape of cheekbones, length of jawlines and many more facial features. The software does this by putting the image of the face on a faceprint, a numerical code that represents the human face. Facial recognition software used to have to rely on a 2D image with the person almost directly facing the camera. Now, with FaceIt, a 3D image can be compared to a 2D image by choosing 3 specific points off of the 3D image and converting it into a 2D image using a special algorithm that can be scanned through almost all databases.

10

2.2.3

RETINAL

1935 The idea for retinal identification was first conceived by Dr. Carleton Simon and Dr. Isadore Goldstein was published in the New York State Journal of Medicine in 1935. The idea was a little before its time, but once technology caught up, the concept for a retinal scanning device emerged in 1975. 1976 In 1976, Robert "Buzz" Hill formed a corporation named EyeDentify, Inc., and made a full-time effort to research and develop such a device. In 1978, specific means for a retinal scanner was patented, followed by a commercial model in 1981.

2.2.4

FINGERPRINT 1686 Malpighi In 1686, Marcello Malpighi, a professor of anatomy at the University of Bologna, noted in his treatise; ridges, spirals and loops in fingerprints. He made no mention of their value as a tool for individual identification. A layer of skin was named after him; "Malpighi" layer, which is approximately 1.8mm thick.

1823 - Purkinji In 1823, John Evangelist Purkinji, a professor of anatomy at the University of Breslau, published his thesis discussing 9 fingerprint patterns, but he too made no mention of the value of fingerprints for personal identification.
11

1856 - Hershel The English first began using fingerprints in July of 1858, when Sir William Herschel, Chief Magistrate of the Hooghly district in Jungipoor, India, first used fingerprints on native contracts. Sir Herschel's private conviction that all fingerprints were unique to the individual, as well as permanent throughout that individual's life, inspired him to expand their use. 1880 - Faulds During the 1870's, Dr. Henry Faulds, the British Surgeon- Superintendent of Tsukiji Hospital in Tokyo, Japan, took up the study of "skin-furrows" after noticing finger marks on specimens of "prehistoric" pottery. In 1880, Dr. Faulds published an article in the Scientific Journal, "Nature" (nature). He discussed fingerprints as a means of personal identification, and the use of printers ink as a method for obtaining such fingerprints. 1882 - Thompson In 1882, Gilbert Thompson of the U.S. Geological Survey in New Mexico used his own fingerprints on a document to prevent forgery. This is the first known use of fingerprints in the United States. 1888 - Galton Sir Francis Galton, a British anthropologist and a cousin of Charles Darwin, began his observations of fingerprints as a means of identification in the 1880's. 1891 - Vucetich Juan Vucetich, an Argentine Police Official, began the first fingerprint files based on Galton pattern types. At first, Vucetich included the Bertillon System with the files.

12

1892 Vucetich & Galton Juan Vucetich made the first criminal fingerprint identification in 1892. Sir Francis Galton published his book, "Fingerprints", establishing the individuality and permanence of fingerprints. The book included the first classification system for fingerprints. While he soon discovered that fingerprints offered no firm clues to an individual's intelligence or genetic history, he was able to scientifically prove what Herschel and Faulds already suspected: that fingerprints do not change over the course of an individual's lifetime, and that no two fingerprints are exactly the same. According to his calculations, the odds of two individual fingerprints being the same were 1 in 64 billion. Galton identified the characteristics by which fingerprints can be identified. These same characteristics (minutia) are basically still in use today, and are often referred to as Galton's Details. 1897 Haque & Bose On 12th June 1987, the Council of the Governor General of India approved a committee report that fingerprints should be used for classification of criminal records. Later that year, the Calcutta (now Kolkata) Anthropometric Bureau became the world's first Fingerprint Bureau. Working in the Calcutta Anthropometric Bureau (before it became the Fingerprint Bureau) were Azizul Haque and Hem Chandra Bose. Haque and Bose are the two Indian fingerprint experts credited with primary development of the Henry System of fingerprint classification (named for their supervisor, Edward Richard Henry). The Henry classification system is still used in all English-speaking countries.

13

1901 - Henry Introduction of fingerprints for criminal identification in England and Wales, using Galton's observations and revised by Sir Edward Richard Henry. 1902 First systematic use of fingerprints in the U.S. by the New York Civil Service Commission for testing. Dr. Henry P. DeForrest pioneers U.S. fingerprinting. 1903 The New York State Prison system began the first systematic use of fingerprints in U.S. for criminals. 1904 The use of fingerprints began in Leavenworth Federal Penitentiary in Kansas, and the St. Louis Police Department. They were assisted by a Sergeant from Scotland Yard who had been on duty at the St. Louis World's Fair Exposition guarding the British Display. Sometime after the St. Louis World's Fair, the International Association of Chiefs of Police (IACP) created America's first national fingerprint repository, called the National Bureau of Criminal Identification. 1905 U.S. Army begins using fingerprints. U.S. Department of Justice forms the Bureau of Criminal Identification in Washington, DC to provide a centralized reference collection of fingerprint cards. Two years later the U.S. Navy started, and was joined the next year by the Marine Corp. During the next 25 years more and more law enforcement agencies join in the use of fingerprints as a means of personal identification. Many of these agencies began sending copies of their fingerprint cards to the
14

National Bureau of Criminal Identification, which was established by the International Association of Police Chiefs. 1907 U.S. Navy begins using fingerprints. U.S. Department of Justice's Bureau of Criminal Identification moves to Leavenworth Federal Penitentiary where it is staffed at least partially by inmates. 1908 U.S. Marin Corps begins using fingerprints. 1918 Edmond Locard wrote that if 12 points (Galton's Details) were the same between two fingerprints, it would suffice as a positive identification. Locard's 12 points seems to have been based on an unscientific "improvement" over the eleven anthropometric measurements (arm length, height, etc.) used to "identify" criminals before the adoption of fingerprints. 1924 In 1924, an act of congress established the Identification Division of the FBI. The IACP's National Bureau of Criminal Identification and the US Justice Department's Bureau of Criminal Identification consolidated to form the nucleus of the FBI fingerprint files. 1946 By 1946, the FBI had processed 100 million fingerprint cards in manually maintained files and by 1971, 200 million cards. With the introduction of AFIS technology, the files were split into computerized criminal files and manually maintained civil files.

15

2005 The FBIs Integrated AFIS (IAFIS) in Clarksburg, W V has more than 49 million individual computerized fingerprint records for known criminals. Old paper fingerprint cards for the civil files are still manually maintained in a warehouse facility (rented shopping center space) in Fairmont, WV, though most enlisted military service member fingerprint cards received after 1990, and all military-related fingerprint cards received after 19 May 2000, have now been computerized and can be searched internally by the FBI. In some future build of IAFIS, the FBI may make such civil file AFIS searches available to other federal crime laboratories. All US states and larger cities have their own AFIS databases, each with a subset of fingerprint records that is not stored in any other database. Thus, law enforcement fingerprint interface standards are very important to enable sharing records and mutual searches for identifying criminals. The history of fingerprints, Source: Moore, G, 2005

16

2.3

FINGERPRINT AUTHENTICATION
According to Prabhakar, Salil and Jain, Anil (n.d), fingerprint-based identification is the oldest method which has been successfully used in numerous applications. A fingerprint is made of a series of ridges and furrows on the surface of the finger. The pattern of ridges and furrows as well as the minutiae points can determine the uniqueness of a fingerprint. Minutiae points are local ridge characteristics that occur at either a ridge bifurcation or a ridge ending. Fingerprinting is the oldest method of successfully matching an identity. A persons fingerprints are a complex combination of patterns known as lines, arches, loops and whorls (Biometric Technology, Inc, 2002). The most distinctive characteristics are the minutiae, the smallest details found in the ridge endings. Fingerprints cannot be forged and every individual has a unique print. Fingerprints have some advantages such as the prints remain the same throughout a persons lifetime, the fingerprinting is neither frightening nor emotionally disturbing and peoples prints are unique. Fingerprints also have some disadvantages. There are searching through a huge database can be rather slow, dirt on the finger or injury can blur the print, a fingerprint template is rather large compared to other biometric devices. Fingerprints were one of the first biometrics to be adopted and have become synonymous with reliable personal identification. Among other biometrics technology, fingerprint has several advantages such as its universality, high distinctiveness and high performance. In universality, large majority of the human population has legible fingerprints and can easily be authenticated. Because of its high distinctiveness, twins who share the same DNA have been shown to have different fingerprint since the ridge structure on the finger is not encoded in the genes of an individual. Thus, fingerprints represent a stronger authentication mechanism than DNA.

17

2.4

FINGERPRINT PATTERN

The analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies. Scientists have found that family members often share the same general fingerprint patterns, leading to the belief that these patterns are inherited. The three basic patterns of fingerprint ridges are the arch, loop, and whorl. 2.4.1 Arch The ridges enter from one side of the finger, rise in the center forming and arc, and then exit the other side of the finger as figure 5. 2.4.2 Loop The ridges enter from one side of a finger, form a curve, and then exit on that same side as figure 6. 2.4.3 Whorl Ridges form circularly around a central point on the finger as figure 7.

18

Figure Figure2.1: 5: Arch Arch pattern Figure 2.1: Archpattern pattern

Figure Figure2.2: 6: Loop Looppattern pattern

Figure 7: Whorl pattern


19

2.5

CONCLUSION

Table 1: The advantage, disadvantage, and purpose of fingerprint pattern Advantage Iris Very high accuracy Verification time is generally less than 5 seconds The eye from a dead person would deteriorate too fast to be useful, so no extra precautions have to been taken with retinal scans to be sure the user is a living human being Retinal Very high accuracy There is no known way to replicate a retina The eye from a dead person would deteriorate too fast to be useful, so no extra precautions have to been taken with retinal scans to
20

Disadvantage Intrusive A lot of memory for the data to be stored Very expensive -

Purpose Analyze the features in the colored tissue surrounding the pupil which has more than 200 points that can be used for comparison, including rings, furrows and freckles. Iris recognition technology combines computer vision, pattern recognition, statistical inference, and optics

Very intrusive It has the stigma of consumer's thinking it is potentially harmful to the eye

Retinal scanners are typically used for authentication and identification purposes. Retinal scanning has been utilized by several government agencies, prisons, and medical applications.

Comparisons of template records can take upwards of 10

be sure the user is a living human being.

seconds, depending on the size of the database. Very expensive.

Facial

Non-intrusive Cheap technology

2D recognition is affected by changes in lighting, the persons hair, the age, and if the person wear glasses.

Commonly used for security purposes but are increasingly being used in a variety of other applications.

Requires camera equipment for user identification; thus, it is not likely to become popular until most PCs include cameras as standard equipment.

21

Finger print

Very high accuracy. Is the most economical biometric PC user authentication technique.

For some people it is very intrusive, because is still related to criminal identification.

Used to identify individuals and verify human fingerprints.

it is one of the most developed biometrics

It can make mistakes with the dryness or dirty of the fingers skin, as well as with the age (is not appropriate with children, because the size of their

Easy to use. Small storage space required for the biometric template, reducing the size of the database memory required

It is standardized.

fingerprint changes quickly). Image captured at 500 dots per inch (dpi). Resolution: 8 bits per pixel. A 500 dpi fingerprint image at 8 bits per pixel
22

demands a large memory space, 240 Kbytes approximately Compression required (a factor of 10 approximately)

Table 1 shows the advantage, disadvantage and purpose of fingerprint pattern. Based on the Table 1, the fingerprint has more advantage between the others it is one of the developed biometrics and easy to use.

23

CHAPTER 3: RESEARCH METHODOLOGY


3.1 INTRODUCTION
This project is an open source microcontroller. This PIC microcontroller based project designed to develop a fingerprint attendance system using SNFPR- UART fingerprint reader module. This project is able to store numbers of fingerprints and perform matching to mark users attendance on selected day. Furthermore, exporting attendance list to text file is also supported by system with the help of Graphical User Interface (GUI) provided. This project will provides hands-on experience in interfacing fingerprint reader with PIC microcontroller through UART (Universal Asynchronous Receiver / Transmitter). On the other hand, also include an extra programmed UART port to interface with PC. Figure 8 show the flow of project and Figure 9 shows the system overview.

START

Build electronic circuits for portable finger print recognize system.

Develop based graphical user interface (GUI)

Integrate graphical user interface (GUI) and C program with hardware

Documentation

END

Figure 8: Flow of project

24

Personal Computer

Push Buttons LCD Display

LEDS Signal SN-FPRUART Fingerprint Reader 16F876A

BUZZER

Figure Figure3.1: 9: System SystemOverview Overview Figure 3.2: System Overview

25

3.2

COMPONENT OVERVIEW
3.2.1 PIC16F876A

Based on PIC16F876A (Figure 10) are useful in this system because that powerful (200 nanosecond instruction execution) yet easy-toprogram (only 35 single word instructions) CMOS FLASH-based 8bit microcontroller packs Microchips powerful PIC architecture into a 28-pinpackage and is upwards compatible with the PIC16C5X, PIC12CSN-FPR-UART and PIC16C7X devices. Feature of the device: 256 bytes of EEPROM data memory Self programming ICD (In Circuit Debugging function) 2 Comparators 5 channels of 10-bit Analog-to-Digital (A/D) converter 2 capture/compare/PWM functions The synchronous serial port can be configured as either 3-wire Serial Peripheral Interface (SPI) or the 2-wire Inter-Integrated Circuit (IC) bus Universal Asynchronous Receiver Transmitter (USART)

Figure Figure 3.2: 10: PIC16F876A PIC16F876A Figure 3.3: PIC16F876A

26

3.2.2

SN-FPR-UART

SN-FPR-UART is a compact fingerprint module with built in memory. The reader through featured UART with port direct and interface high with

microcontroller

acquisition/

identification speed. SN-FPR-UART fingerprint reader provides developers and hobbyists a simple way to include fingerprint reading feature in this project. Figure 11 shows the correct way to scan the fingerprint.

Figure Figure 3.3: 3.4: 11: The The way way to to scan scan the the fingerprint fingerprint

3.2.3

Interface LCD

Figure 12 shows the connections, resistor R8 and R9 (refer table 3.1) are used to avoid disturbance from RB6 and RB7 when the two pins used for program the PIC microcontroller.

Figure Figure 3.4: 3.5: 12: Interface Interface LCD LCD (2 (2 x x 16 16 Characters) Characters)
27

Table 2: Pin Description Pin Name 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 VSS VCC VEE RS R/W E DB0 DB1 DB2 DB3 DB4 DB5 DB6 DB7 LED+ LEDPin Function Ground Positive supply for LCD Contrast adjust Select register or data register Select read data or write Start data read or write data Data bus pin Data bus pin Data bus pin Data bus pin Data bus pin Data bus pin Data bus pin Data bus pin Backlight positive input Backlight negative input Connection GND 5V Connected to a preset RC4 GND RC5 RB0 RB1 RB2 RB3 RB4 RB5 RB6 RB7 5V GND

Table 2 show the name, pin function, and connection of LCD interface. There are 16 pins in LCD interface. This LCD using the 5V for positive supply and also has LED+ backlight positive input and Backlight negative input for LED.

3.3

HARDWARE DEVELOPMENT
3.3.1 Power Supply

By this project will be choosing either AC to DC adaptor or 9V-12V to power up the circuit. Higher input voltage will produce more heat at LM7805 voltage regulator. Typical voltage is 12V. LM7805 will still generate some heat at 12V. There are two type of power connector for the circuit, DC plug (J1) and 2510-02 (Power
28

Connector). Normally AC to DC adaptor can be plugged to J1 type connector. Refer to Figure 13, the D1 is use to protect the circuit from wrong polarity supply. C3 and C4 is use to stabilize the voltage at the input side of the LM7805 voltage regulator, while the C5 and C6 is use to stabilize the voltage at the output side of the LM7805 voltage supply. LED is a green LED to indicate the power status of the circuit. R1 is resistor to protect LED from over current that will burn the LED.

Figure 13: Schematic of Power Supply Diagram Figure 3.5: Schematic of Power Supply Diagram 3.2.2 Push Button as Input for PIC microcontroller Three I/O pin is needed for three push button as input of PIC microcontroller. Another push button is use for RESET. The connection of the push button to the I/O pin is shown in Figure 14. The I/O pin should be pull up to 5V using a resistor (with value range 1K-10K) and this configuration will result an active-low input. When the button is being pressed, reading of I/O pin will be in logic 0, while the button is not pressed, reading of that I/O pin will be logic 1.

Figure 3.6: Schematic of Pushas Button for PIC Figure 14: Schematic of Push input as forinput PIC microcontroller 29 Button microcontroller

3.3.3

LED as output of PIC microcontroller

Three I/O pin is needed for two LEDs and Buzzer as output of PIC microcontroller. The connections are shown in Figure 15. The I/O pin should be pull too HIGH in order to on the LEDs and buzzer. The transistor is used to provide more current for the buzzer.

Figure Figure 3.7: 15: Schematic Schematic of of LED LED as as output output of of PIC PIC microcontroller 3.3.4 Ports for UART interface

In this project, there are three ports for UART interface. One port is connected to the default (internal) UART pins in PIC microcontroller which are RC6 and RC7. Another two ports are connected to 4 I/O pins of PIC microcontroller. Resistor connected to each of TX and RX pin to avoid signal disturbance. Figure 16 shows the connections.

Figure Figure 3.8: 16: Schematic Schematic for for ports ports UART UART interface interface 30

3.3.5

Soldering process

3.3.5.1 Soldering Iron Pin

Soldering process has start by solder the electronic components one by one according the symbols and overlays on the Printed Circuit Board (PCB). Ensure the component value and polarity is correctly soldered. The polarity electronic component such as capacitor, diode, PIC, buzzer, and LED should be soldered in right polarity on the circuit board. Figure 17 shows the soldering the iron pin.

Figure 17: Soldering iron pin

3.3.5.2 Soldering the board

Based on the Figure 18, it is shows the entire component requirement that need to soldering on the board. The require components are: o Reset button (to reset the microcontroller). o Push button. o UIC00A box header (connect to UIC00A/B programmer to load program).
31

o 2510-02 connector (power connector). o 2510-04 connector (UART connector). o Parallel LCD 2x16. o Preset (adjust contrast of LCD display). o Crystal (20MHz). o 9. LEDs 3mm. o PIC16F876A. o Buzzer. o Slide switch (to ON or OFF the circuit). 13. LM7805 (+5V Regulator)

Figure 18: Fully of PCB board Figure 3.11: Fully of PCB board
The result shows in Figure 19.

Figure 19: Soldering the board


32

3.4

PROJECT REQUIREMENT

Table 3: List of Component

No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

Component IC PIC16F876A IC Socket-28 pin(slim) Crystal H49S (Low Profile) 20MHz Voltage Regulator +5V Diode 1N4007 Diode 1N4148 Electrolytic Capacitor 16V 47uF Multilayer Capacitor 0.1uF Ceramic Capacitor 30pF Resistor 1/4W 330R Resistor 1/4W 10K Resistor 1/4W 1K LED 3mm Green LED 3mm Yellow LED 3mm Orange PCB for PR27 2510 PCB Connector 4 Ways Slide switch 3 pins (Black) DC Plug (Adaptor Socket) 6x6x1 Push Button 2 Pins Buzzer-PCB Mount Preset 5K Transistor 2N2222 10 Ways Straight Box Header LCD (16x2) Straight Pin Header(Male) 16 Ways Straight Pin Header(Male) 2 Ways
33

Product Code IC-PIC-16F876A IS-28PIN(S) CR-H49S-20M VR-7805 DI-1N4007 DI-1N4148 CP-EC-16-47UF CP-CC-0.1UF CP-CC-30PF RS-025W-330R RS-025W-10K RS-025W-1K DS-LED-3NG DS-LED-3NY DS-LED-3NO PCB-PR-027 CN-04-2510 SW-SL-3N-061206 CN-HL-2527-B SW-PBM-2N-060601 SO-BUZZ-PCB RS-RM-065-5K TR-2N-2222 CN-IDC-BOX-10 DS-LCD-JHD162A CN-PH-M140S CN-PH-M140S

Quantity 1 1 1 1 1 1 2 6 2 3 4 3 1 1 1 1 3 1 1 4 1 1 1 1 1 1 3

28 29 30 31 32

Mini Jumper 2510 PCB Connector 2 Ways Bolt M3x6mm M3 Nut Fingerprint Reader module Optional

CN-PH-MJ CN-02-2510 HD-PM-M3-6 HD-PM-M3-NUT SN-FPR-UART

3 1 4 4 1

33 34

UIC00A Programmer AC to DC adaptor

UIC00A Programmer AC to DC adaptor UC00A USB to

1 1

35

UC00A USB to UART Converter

UART Converter

Table 3 shows the component/part/hardware that was used to complete the project. RM538 were used to purchase the entire item.

3.5

CONCLUSION
In conclusion, two method were used in assemble to the component, using the battery and USB. The coding was based on combination of MPLAB. The complete system is able to work properly without any problem but the testing is yet to come on the next chapter

34

CHAPTER 4: RESULTS AND DISCUSSION


4.1 INTRODUCTION
This chapter covers the testing and result. The testing was done in two situations, by using the battery and USB. Both of the result is explained in each sub topic.

4.2

Testing PR29 PCB Board with SN-FPR-UART Fingerprint Reader (Without UC00A)
After completing installation and soldering of electronic components on a circuit, attempts were made to use the 9V battery to turn on the PCB board. It is without using UCU00A. Using a battery as the source, the user can save the data by placing a finger on the fingerprint reader. At start-up, it will display on the LCD are two options it is admin and user. Admin should be set first as admin because admin can manage the system with options provided in Admin mode. Users are only allowed to use the system attendance to record the attendance. The figure 20 shows the PCB board with fingerprint reader without UC00A.

Figure 20: PCB board with fingerprint reader (without Figure 4.1: PCB board with fingerprint reader (without 35 UC00A) UC00A)

Figure 21: Illustrations of the connections

The result shows successfully with the battery 9V as input.

4.3

Testing PR29 PCB board with SN-FPR-UART Fingerprint Reader (With UC00A)
Being hardware installation is set up correctly. UART connection used to connect to a PC serial port. UC00A's drivers must be installed in the computer. After UC00A connected to the USB port, the TX of PCBs has to connect TX RX of UC00A of UC00A while connected to RX of PCBs as Figure 22. Fingerprint reader GUI used to export attendance list to personal computers. Fingerprint reader GUI has been developed by using Microsoft Visual Basic software as shown in Figure 24. Communication port is set to the largest number after the driver installation. Baud rate used is 19200. There are two options on the target device "interface with PR29" and "interface with Reader". Interface with PR29 used to export attendance from the system as shown in Figure 25.

36

Figure 22: Connections for PCB-Fingerprint Reader-UC00A

Figure 23: Illustration of the connection

37

Figure 24: Fingerprint Reader GUI Panel

Figure 25: Fingerprint Reader GUI export attendance

38

CHAPTER 5: CONCLUSION AND RECOMMENDATION


5.1 CONCLUSION
This project mainly comprised of development of attendance management system and fingerprint identification system. Attendance management is very helpful in saving valuable time of students and teachers, paper and generating report at required time. The system successfully took the attendance both at lectures and examinations as discuss in Chapter 4. The project successfully captured new fingerprints to be stored in the database; scanned fingerprints placed on the device sensor and compared those stored in the database successfully. The result of the system was acceptable and would be considered for full implementation especially because of its short execution time and reports generation.

5.2

RECOMMENDATION
The following suggestions should be considered in carrying out further work on this study: The system can be linked with the Unikl MFI Campus central database so that the student registration phase can be eliminated and the bio-data can be directly from the database. The university should acquire the fingerprints of all students at admission. The components could be chosen and assembled in a commercialized manner: instead of a stand-alone fingerprint scanner and a laptop, the unit could have the fingerprint scanner, a small LCD screen and a keypad all attached to the wall of each classroom.

39

REFERENCES

R. Heidn. A world history of fingerprint, Chinese People Security University Press. 2008.

Public

Neeta Nain, Deepak B M, Dinesh Kumar, ManishaBaswal, and Biju Gautham. Optimized MinutiaeBased Fingerprint Matching, Proceedings. 2008. Stephan huckemann,Thonmas Hotz, and Axel Munk, Global Models for the Orientation Field of Fingerprints: An Approach Based on Quadratic Differentials, IEEE Transactions. 2008.

40

APPENDIX A: FLOW CHART SEQUENCE OF ATTENDANCE MANAGEMENT SYSTEM BY USING FINGERPRINT RECOGNITION
Main Loop

Initialize PIC, LCD and Fingerprint reader

YES Reset Admin

SW1 and SW2 both are pressed? A2

NO ADMIN

Admin or User

A1

USER

NO

SW3 pressed to mark attendance?

YES Perform Matching

NO

User found?

YES Mark Attendance

41

A1

Admin Matched? YES

NO

A2

SW1 Pressed SW2 Pressed Mode1 Mode1? Operation SW1 Pressed SW3 Pressed Mode2 Mode2? Operation SW1 Pressed SW3 Pressed Mode3 Operation SW3 Pressed

SW2 Pressed

SW2 Pressed

Mode3?

SW2 Pressed

SW2 Pressed

SW2 Pressed

SW1 Pressed SW3 Mode4 Pressed Mode4? Operation SW1 Pressed SW3 Pressed Mode5 Mode5? Operation SW1 Pressed SW3 Pressed Mode6 Mode6? Operation SW1 Pressed SW3 Pressed Mode7 Operation

SW2 Pressed

Mode7?

SW2 Pressed

SW1 Pressed SW3 Pressed Mode8? SW1 Pressed

Mode8 Operation

42

MODE 1 OPERATION: SET DAY


Mode1 operation

SW1 PRESSED

Check which switch is pressed

SW2 PRESSED

Increment day counter by 1


SW3 PRESSED

Decrement day counter by 1

Set Day with value in day counter

End Mode1 operation

43

MODE 2 OPERATION: ADD NEW DATA


Mode2 operation

SW1 PRESSED

Check which switch is pressed

SW2 PRESSED

Increment day counter by 1


SW3 PRESSED

Decrement day counter by 1

User Selected

Add new fingerprint to User Selected

Add new fingerprint operation success?

Prompt Successful Signal

Prompt Fail Signal

End Mode2 operation

44

MODE 3 OPERATION: DELETE A DATA


Mode3 operation

SW1 PRESSED

Check which switch is pressed

SW2 PRESSED

Increment day counter by 1


SW3 PRESSED

Decrement day counter by 1

User Selected

Send delete specific user command

Awaiting reply

YES

Data Deleted Successfully?

NO

Prompt Successful Signal

Prompt Fail Signal

End Mode3 operation

45

MODE 4 OPERATION: DELETE ALL DATA


End Mode4 operation

Send delete all command

Awaiting reply

YES

Data Deleted Successfully?

NO

Prompt Successful Signal

Prompt Fail Signal

End Mode4 operation

46

MODE 5 OPERATION: CHANGE ADMIN


Mode5 operation

Verification of formal Admin

Awaiting reply

Formal Admin Matched?

YES Delete Formal Admin Data

Add new fingerprint to User Selected / Admin

NO Add new fingerprint operation (Admin) success?

YES End Mode5 operation

47

MODE 6 OPERATION: VIEW ATTENTAND


Mode6 operation

Show DAY1 attendance

Show DAY2 attendance

Show DAY3 attendance

Show DAY4 attendance

Show DAY5 attendance

End Mode6 operation

MODE 7 OPERATION: VIEW ATTENDANCE


Mode7 operation

Clear attendance

End Mode7 operation

48

MODE 8 OPERATION: EXPORT


Mode8 operation

GUI

Export to GUI/ Hyper terminal?

Hyper Terminal

Export in GUI format

Export in Hyper Terminal format

End Mode8 operation

9: RESET ADMIN FLOW


Reset Admin

Reset (delete) Admin

Add new fingerprint to User Selected / Admin

Add new fingerprint operation (Admin) success? YES End Reset Admin

NO

49

10. ADD NEW FINGERPRINT TO USER SELECTED/ADMIN


Add new fingerprint to User Selected/ Admin

Send Add fingerprint command 1

Receive DATA SUCESS? YES Send Add fingerprint command 2

NO

Receive DATA SUCESS? YES Send Add fingerprint command 3

NO

YES

Receive DATA SUCESS?

NO

Prompt Successful Signal

Prompt Fail Signal

End Add new fingerprint

50

APPENDIX B: CIRCUIT DIAGRAM

Figure 1: Microcontroller

Figure 2: Crystal 51 20MHz

Figure 3: ICSP PROGRAMMER

52

You might also like