0% found this document useful (0 votes)
266 views27 pages

Biometric Attendance Application

The document describes a proposed biometric attendance application for tracking student attendance using fingerprint scanning. It discusses the limitations of existing paper-based and RFID systems and outlines the benefits of the proposed biometric system such as being time efficient, preventing proxy attendance, and automatically calculating attendance percentages. The document then covers the modular design of the application including user authentication, marking attendance, and fingerprint enrollment. It also discusses security considerations and references technologies used in the implementation.

Uploaded by

meena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
266 views27 pages

Biometric Attendance Application

The document describes a proposed biometric attendance application for tracking student attendance using fingerprint scanning. It discusses the limitations of existing paper-based and RFID systems and outlines the benefits of the proposed biometric system such as being time efficient, preventing proxy attendance, and automatically calculating attendance percentages. The document then covers the modular design of the application including user authentication, marking attendance, and fingerprint enrollment. It also discusses security considerations and references technologies used in the implementation.

Uploaded by

meena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Under the guidance of:

Prof. Sanjeev Agrawal

Biometric
Attendance
Application Presented by:
Rhythm Millborn
M. Varun Raj
Kamakshi Sethi
Dheivameena Karuppanchetty
Overview
● Existing System
● Proposed System
● Modular Design
● Security Consideration
● E-R Diagram
● Implementation
● Conclusion
● References

2 of 27
Existing Attendance
Systems

3 of 27
Paper Based Attendance System
● Time consuming
● Tedious and cumbersome
● Prone to proxy
● Headcount required
● Inefficient
● Wastage of paper

4 of 27
RFID (Radio Frequency Identification)
Based System
● Expensive
● Prone to proxy
● Not easy for operator
● Can not be directly controlled by operator
● Problematic if card is lost or forgotten

5 of 27
Proposed Attendance
System

6 of 27
Biometric Attendance Application
● 100% genuine record
● Time efficient
● Techno savvy
● No extra record keeping required
● Automatic attendance percentage calculation
● Easy and helpful for professors

7 of 27
Graphical User Interface (GUI)
Design Considerations:

● Simplicity
● Consistency
● Performance
● Efficient layout
● Visual appeal
● Usability

8 of 27
Start

Professor
Login
N
Successful
Y

Flowchart for Attendance Link


Activation

Biometric Mark Attendance

Attendance Error
Biometric
Verification Next
Application Attendance
Student

Successfully
recorded

Attendance
Link
Deactivation N
Y
Stop 9 of 27
Modular Design

10 of 27
User Authentication
● Professor will be provided with a unique username
and password.
● Professor will get authenticated and directed to the
next screen.
● All students add their fingerprint during registration.
● Lecture is activated by professor.

11 of 27
Marking Attendance
● Once the lecture is activated, students’ fingerprint is
scanned.
● Failure can occur due to:
○ Failure to enroll rate (FTE): depends on the functionality of
the system
○ Failure to capture (FTC): occurs due to poor quality inputs
● Once successfully scanned, fingerprint is verified and
attendance is marked.

12 of 27
Fingerprint Enrollment and
Authentication Process

13 of 27
Security
Considerations

14 of 27
Security Threats
Application can be attacked by:

● Viruses
● Worms
● Trojans
● Spyware
● Ransomware

15 of 27
Damage
● Identity theft
● Information extortion
● Sabotage
● Exploitation of vulnerable databases

Counter-measures
● Databases are one of the most compromised assets
● Bringing the system offline
● Deploying and upholding a strict access and privileges control
policy

16 of 27
Systems using external
databases via web High risk
servers

Systems using internal


space for storage
Low risk

17 of 27
Capacity expansion
● 4-5 fingerprints storage
● Rooting can provide capacity expansion
● Rooting allows Android OS to attain privileged control
over various Android subsystems
● We have used Root Genius
● Malware installed can destroy system

18 of 27
Technologies Used

19 of 27
Entity Relationship
Diagram (ERD)

20 of 27
21 of 27
Implementation

22 of 27
23 of 27
Conclusion
● Fingerprint acquisition and attendance management
module implemented through Android application.
● Better performance than other traditional recording
methods in terms of time consumption, proxy resistance,
efficiency and ease of operation.
● Moreover, it supersedes the other systems by being
eco-friendly and inexpensive.

24 of 27
References
● Shanbhag, Gautam, et al. ”Mobile based attendance marking system using android and biometrics.”
IJIRST- International Journal for Innovative Research in Science Technology 1.1 (2014): 87-90.
● Mongia, Bhupinder S., and Vijay K. Madisetti. ”Reliable real-time applications on android os.” IEEE
Electrical and Computer Engineering Electrical and Computer Engineering(2010).
● Adal, Hamim, et al. ”Android based advanced attendance vigilance system using wireless network with
fusion of biometric fingerprint authentication.” 2018 20th International Conference on Advanced
Communication Technology (ICACT) . IEEE, 2018.
● Banerjee, Ishan, et al. ”Graphical user interface (GUI) testing: Systematic mapping and repository.”
Information and Software Technology 55.10 (2013): 1679-1694.
● Studio, Android. ”Android Studio.” The Official IDE for Android (2017).
● Badhe, Sanjay, et al. ”Smart Attendance Management System.” International Journal of Computer
Applications 975 (2016): 8887.

25 of 27
References
● Islam, Md Milon, et al. "Development of smartphone-based student attendance system." 2017 IEEE
Region 10 Humanitarian Technology Conference (R10-HTC). IEEE, 2017.
● Zhang, Zhongwen, et al. ”Once root always a threat: Analyzing the security threats of android permission
system.” Australasian Conference on Information Security and Privacy. Springer, Cham, 2014.
● Rashidi, Bahman, and Carol J. Fung. ”A Survey of Android Security Threats and Defenses.” JoWUA 6.3
(2015): 3-35.
● Sun, San-Tsai, Andrea Cuadros, and Konstantin Beznosov. ”Android rooting: Methods,detection, and
evasion.” Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones
and Mobile Devices. 2015.
● Zhang, Hang, Dongdong She, and Zhiyun Qian. ”Android root and its providers: A double-edged sword.”
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015.

26 of 27
27 of 27

You might also like