This project titled Design
and Implementation of Student Attendance Authentication System focuses on leveraging
biometric technology, specifically fingerprint recognition to develop a secure
and automated method for logging student attendance in educational
institutions. Traditional methods of tracking attendance are fraught with
inefficiencies, vulnerabilities to manipulation (such as proxy attendance), and
administrative overhead. In addressing these challenges, the study adopts a
structured requirements engineering process and systematic software development
approach to design, implement, and evaluate a fingerprint-based biometric
system that ensures accurate and verifiable student identification during
lectures. The primary aim of the project is to develop a functional attendance
authentication system using fingerprint technology that guarantees integrity,
security, and real-time monitoring. To achieve this, the study explores and
evaluates various biometric technologies including iris, voice, facial, and
hand geometry recognition, analyzing their technical and application-specific
attributes. However, fingerprint recognition is selected for implementation due
to its maturity, affordability, reliability, and widespread acceptability. The
system was developed using Visual Basic Studio, chosen for its object-oriented
capabilities, ease of use, built-in features, and compatibility with database and
network applications. Microsoft Access was used as the backend database to
store students' biometric records and attendance logs. Unified Modelling
Language (UML) tools were employed to model system architecture and use-case
diagrams, while the GRAPPLE framework guided the development lifecycle,
allowing rapid prototyping and early end-user feedback critical in systems
involving unfamiliar biometric interfaces. At the core of the system design is
the generic biometric architecture, which includes two main processes:
enrolment and authentication. During enrolment, a student's fingerprint is
scanned, features are extracted, and a reference template is generated and
stored in a secure database. During authentication, the live fingerprint scan
is compared to the stored template to verify the student’s identity, allowing
seamless attendance logging. This project contributes to the growing field of
biometric integration in educational settings. It not only enhances the
accuracy and efficiency of attendance management but also provides a scalable
model for broader institutional adoption. The system ensures real-time data
capture, reduces manual intervention, and curbs academic dishonesty. In
conclusion, the implementation of biometric authentication systems in schools
and universities offers a transformative approach to student management.
Educational institutions aiming for operational efficiency and transparency
should consider adopting fingerprint-based attendance solutions to improve
academic performance tracking, uphold institutional integrity, and eliminate
paper-based methods. This research successfully demonstrates that a biometric
system tailored to institutional needs can significantly optimize educational
processes.
TABLE OF CONTENTS
ABSTRACT ii
TABLE OF CONTENTS iii
CHAPTER ONE 1
INTRODUCTION 1
1.1 Background to the study: 1
1.1 Statement of the problems 3
1.2 Aim and objectives 6
1.3 Scope and limitation of the study 7
CHAPTER TWO 8
LITERATURE REVIEW 8
2.0 Introduction 8
2.1 The concept of modern biometric system 9
2.2 Evolution of modern biometrics 11
2.4 Classification
of biometric 15
2.4.1 Wayman
classifications of biometric 17
2.4.2 Key technologies
of biometric 20
2.5 Industry standards 29
2.6 Biometric concerns 30
2.6.0 Informational
privacy concerns 31
2.6.1 Physical privacy
concern 32
2.6.2 Religious concerns 32
2.7 Performance of biometric 33
CHAPTER THREE 36
METHODOLOGY AND SYSTEM
ANALYSIS 36
3.0 Introduction 36
3.1 Research methodology 37
3.2 Modelling and requirements engineering 39
3.2.0 Mapping GRAPPLE and Requirements Engineering 41
3.2.1 Requirements
Management using DOORS 43
3.2.2 Defining the
Problem Domain 44
3.3 Requirements engineering in the problem
domain 45
3.3.0 Fingerprint
Authentication: Statement of Needs 45
3.4 Requirements gathering in the problem domain 46
3.4.0 Develop
Stakeholder Requirements 46
3.4 Analysis of System Requirements 47
3.4.0 System functional
Requirements 47
3.4.1 Non-Functional
Requirements 48
CHAPTER FOUR 49
SYSTEM DESIGN,
IMPLEMENTATION AND TESTING 49
4.0 Introduction 49
4.1 System design 49
4.2 System requirements 51
4.2.0 Hardware Requirement 51
4.2.1 Software Requirement 51
4.3 User interface design 52
4.4 Database design 53
4.5 System operational procedure 53
4.6 System implementation 57
4.7 Software testing and validation 58
4.8 System testing 59
CHAPTER FIVE 60
SUMMARY CONCLUSION AND
RECOMMENDATION 60
5.0 Summary 60
5.1 Conclusion 61
5.2 Recommendation 61
REFERENCES 63
CHAPTER
ONE
INTRODUCTION
1.1 Background to
the study:
In the realm
of information systems, biometric technology has emerged as a crucial tool for
identity verification and authentication. Biometric systems are generally
defined as pattern recognition systems that determine or verify the identity of
an individual by analyzing specific physiological and/or behavioural traits
unique to that person (Minaee et al., 2019). These systems rely on measurable
biological characteristics such as fingerprints, facial features, iris
patterns, or behavioural attributes like voice, signature, or typing rhythm.
The use of biometrics for identification and authentication is not a recent
development; it has deep historical roots and has gradually evolved into a
sophisticated technological domain.
The earliest
known instance of using biometric traits to distinguish individuals can be
traced back to 14th century China. During that time, Chinese merchants
reportedly used inked palm and footprints of children on paper as a rudimentary
form of identification (Julian, 2004). This method allowed them to keep records
and differentiate among children in a society where formal identification
systems were absent. While this practice was far from today's advanced
biometric systems, it laid the groundwork for the use of biological markers for
identity verification.
In Western
scientific history, the first recorded biometric observation was made in 1684
by English botanist Nehemiah Grew. He documented the unique patterns of ridges,
furrows, and pores found in human fingerprints, noting their potential
significance for personal identification (Jiang & Yau, 2020). This
observation marked the beginning of scientific interest in the uniqueness and permanence
of biometric features.
In the 19th
century, Alphonse Bertillon, a French anthropologist and police clerk,
formalized the use of body measurements and physical features such as scars and
tattoos in a system known as Bertillonage. This method attempted to uniquely
identify criminals based on anthropometric data. Though eventually rendered
obsolete by fingerprinting, Bertillonage was a pioneering effort in
systematizing human identification through biometrics and served as a catalyst
for further development in the field (Jiang & Yau, 2020).
Subsequently,
the scientific understanding of biometric identification was significantly
advanced by Sir Francis Galton and Sir Edward Henry. Galton, a cousin of
Charles Darwin, introduced the concept of fingerprint minutiae—distinctive
ridge characteristics—that remain a foundational element of fingerprint
matching algorithms today. Edward Henry developed a practical classification
system for fingerprints, which became widely adopted by law enforcement
agencies. By the early 20th century, fingerprint recognition had become a
standard forensic tool for personal identification, particularly in criminal
investigations ((Minaee et al., 2019).
The 20th
century witnessed revolutionary changes in biometric technology, especially
with the advent of computer-based systems. One major development was the
creation of Automatic Fingerprint Identification Systems (AFIS), which allowed
law enforcement agencies to digitize and automate fingerprint comparisons. AFIS
significantly increased the efficiency and accuracy of identity verification
and became an indispensable tool in criminal justice systems around the world.
With the
exponential growth of information and communication technologies in recent
decades, biometrics has moved beyond forensic science and into mainstream
security and identity management applications. Biometric systems are now being
deployed in a variety of sectors including banking, healthcare, aviation,
telecommunications, and education. In academic institutions, particularly, the
need for reliable and tamper-proof methods of student identity verification has
led to the development of biometric-based attendance systems. These systems
offer enhanced security, eliminate the issue of proxy attendance, and provide real-time
attendance tracking and data analysis.
The
background to this study therefore highlights the long-standing human quest to
identify individuals accurately and securely using unique biological traits. It
also underscores the evolution of biometric systems from simple manual methods
to sophisticated digital technologies, setting the foundation for their
application in modern educational environments. The integration of biometrics
into student attendance systems represents a convergence of historical methods
and cutting-edge technology, aimed at addressing persistent challenges in
academic administration.
1.1
Statement of the problems
Student attendance is a critical component of academic
institutions, as it serves as a major determinant of student engagement,
discipline, and academic performance. Traditionally, many schools, colleges,
and universities, especially in developing countries, still rely on manual or
semi-manual processes to take and record attendance. These methods often
involve calling student names from a register or passing attendance sheets
around the class for students to sign. While simple in concept, these methods
are fraught with inefficiencies, inaccuracies, and abuse.
One of the foremost problems associated with the
traditional manual attendance system is proxy attendance, where students sign
in or answer for their absent peers. This form of malpractice compromises the
integrity of attendance records and undermines the institution's ability to
track true student participation. In large classrooms, it becomes particularly
difficult for instructors to accurately detect such fraudulent practices. The
absence of real-time identity verification leads to manipulated attendance
data, which can have serious implications for academic decisions based on
attendance rates, such as grading, eligibility for examinations, and even
disciplinary actions.
Another significant issue is record management.
Paper-based records or spreadsheet-based systems are vulnerable to damage,
loss, or unauthorized access. Physical registers can be misplaced, altered, or
destroyed, while spreadsheet files can be accidentally deleted or corrupted
without backup. The manual collation of attendance statistics over time is
time-consuming, error-prone, and inefficient. Furthermore, with the growing
student population in many institutions, this outdated method becomes
unsustainable, leading to delays and inconsistencies in administrative tasks
like compiling attendance reports and issuing warnings to defaulters.
In addition, lack of real-time monitoring and feedback
mechanisms in manual systems hinders proactive intervention by school
authorities. For example, a student who is consistently absent may go unnoticed
for several weeks or even the entire semester, resulting in poor academic
outcomes that could have been mitigated through timely follow-up. The existing
systems do not support instant reporting or alerts to guardians or academic
counselors, thereby reducing the effectiveness of institutional oversight.
Furthermore, many existing digital attendance
solutions that have been adopted lack robust authentication mechanisms. For
instance, some systems depend solely on student ID cards or login credentials,
which can be easily shared or misused. Biometric-based systems offer a
potential solution, but their implementation is often limited by cost,
inadequate technical expertise, and poor integration with existing academic
databases. Without proper identity verification, digital systems can be as
vulnerable to abuse as manual ones.
Moreover, in the context of remote or hybrid learning
environments, the problem becomes even more pronounced. The COVID-19 pandemic
has demonstrated the necessity of digital transformation in education. During
virtual classes, it is particularly difficult to verify that a student who has
logged into an online session is indeed the registered student. Hence, there is
a growing need for attendance systems that can authenticate identity reliably,
regardless of whether the class is held in person or online.
In terms of administrative burden, instructors spend a
considerable amount of valuable teaching time on taking attendance, especially
in large lecture halls. This process reduces teaching time and affects the
overall learning experience. Additionally, when discrepancies occur—such as
missing names or disputed absences—resolving them can require a
disproportionate amount of effort, including reviewing security footage or
cross-checking multiple records.
Against this backdrop, it is evident that there is a
pressing need for a more secure, reliable, and automated attendance
authentication system. An ideal solution should leverage modern technologies
such as biometrics (e.g., fingerprint or facial recognition), QR codes, or
mobile-based geolocation and timestamping to ensure that the person marking
attendance is physically present and verifiably the student registered for the
class. Furthermore, the system should provide centralized data storage,
automated reporting, instant alerts, and seamless integration with institutional
learning management systems (LMS).
This project, therefore, seeks to address the
multifaceted problems associated with conventional and suboptimal digital
attendance systems by designing and implementing a Student Attendance
Authentication System that ensures real-time, tamper-proof, and efficient
attendance tracking. It aims to eliminate proxy attendance, improve data
accuracy, and enhance administrative efficiency while offering scalability and
adaptability to both physical and virtual classrooms. By solving these core
challenges, the proposed system will contribute to fostering a more
transparent, accountable, and effective academic environment.
1.2 Aim and objectives
The primary
aim of this study is to adopt a structured approach to requirements engineering
and systematic software development in order to design and implement a
fingerprint-based biometric system for accurate and secure logging of student
attendance during lectures. The specific objectives of the study are to:
i. Explore the various
contemporary biometric technologies such as iris recognition, voice
recognition, fingerprint analysis, facial recognition, and hand geometry.
ii. Analyze the fundamental
principles of these biometric technologies, focusing on both their technical functionalities
and their application in different domains.
iii. Develop a fingerprint
recognition system using object-oriented programming methodologies to ensure
modularity, scalability, and maintainability.
iv. Examine the algorithmic
architecture underlying fingerprint recognition systems to gain a deeper
understanding of their structure, functionality, and deployment mechanisms.
v. Assess the large-scale
implementation of biometric systems with respect to five critical aspects security,
privacy, accuracy, usability, and cost—to identify their practical benefits and
potential risks in real-world applications.
1.3
Scope and limitation of the study
In any research scope and limitation is very
essential, to determine the extend of the study, if the scope is too broad, the
research will not be finished on time and if the scope is too narrow, it may
not meet the user s needs.
The proposal pay attention on development of students
attendance authentication system, it intended to cover only how to enrols and
authenticate users, store the fingerprint sample on the store. The system
should comply with security standards for data transfer and maintenance and
provide the appropriate mechanisms for handling the range of potential errors
conditions that could arise as a result of system operation. The system should
also maintain and protect the integrity of user data within the context of
system failure and recovery. The application should provide acceptable
performance standards in terms of response time and authentication reliability.
This project is limited to the development of student
attendance authentication system using fingerprint to allow login of student at
lectures.
Login To Comment