Implementation Of Biometric Application Security Information Technology Essay

Today the security is one of the biggest jobs through out the universe. The security can implement through different medium, utilizing watchword, guards out side the edifice, CCTV, lock etc. In this undertaking we will discourse about the individual ‘s individuality about the utilizing of their watchword for the security intent and so we will construct and implement the biometric engineering to replace the watchword with the biometric engineering and implement the security of the individual ‘s individuality.

A biometric is a measuring of a biological feature such as fingerprint, iris form, retina image, face or manus geometry ; or a behavior characteristic such as voice, pace or signature. Biometric engineering uses these features to place persons automatically. Ideally the feature should be universally present, alone to the person, stable over clip and easy mensurable.

We will discourse about the biometric engineering and procedure. The undertaking will include the survey of the literature about the biometric and so garner information is analysis to come up with demand for the proposed system. Then the system has been design and implements utilizing fingerprint biometric engineering to enable the security in any company to let employee to time in and time out utilizing fingerprint reader. Merely the fingerprint engineerings have been used to develop the system, the camera is merely used to take the image and confirms the individuality on accessing the system.

1.1 Aims

To analyze the literature about biometric engineering and understand the implicit in procedure.

To analyze the information gathered in literature chapter and come up with the concluding demand for the system.

To plan and implement the application to implement the security utilizing fingerprints biometric engineering.

Test the application as unit and system trial.

Chapter 2 – Literature Reappraisal


This chapter is about to seek for the literature for the difference beginning about the biometries. In this chapter we will garner information about the biometric methodological analysis and their technique and lucubrate the implicit in procedure of hallmark and mandate in biometric system. We will besides seek and exemplify the most likely used engineering in the biometric system which is facial acknowledgment and fingerprint reader.


The term biometries relates to the measuring of features of a living thing in order to place it. The techniques of utilizing physical features for designation can be traced to the ancient Egyptians who used the biometric of tallness ( Roberts, 2003 ) . Biometric refer to hallmark techniques which depend on mensurable single features that can be automatically verified. In other words, we all human being have alone personal properties that can be used for alone designation intents which includes a fingerprint, voice acknowledgment, facial acknowledgment, the form of a retina, flag, retinal and vena.

Uludag et Al ( 2004 ) defined biometric technique that it is an machine-controlled methodological analysis to recognize the individual based in term of their behavior or their physical features. These features and behaviors include the characteristics such as manus geometry, script, face, fingerprints, vena, voice, retina, and iris etc.

Jain et Al ( 2005 ) depict the difference that the biometric technique can be measure by utilizing either individuals behavioral features and or physiological features or can be use both. The behavioral features create from the actions of an single individual, and it indirectly measures alone features of the human organic structure. Which includes signature-scan, keystroke-scan, voice acknowledgment, etc ( but it ‘s non limited ) . Time can move as a metric for behavioral biometries, because it measures behaviour by sing the timeline of a given procedure. The physiological biometries technique consists of measurings and informations congregated from direct measuring of a portion of the human organic structure such as geometry, facial acknowledgment, fingerprint, iris-scan etc. ( Jain et al, 2005 ) .

Ashbourn ( 2004 ) besides describe that presently the most popular techniques are the 1s are based on physical features as fingerprint ridge form, manus geometry, retinal acknowledgment, facial acknowledgment, and besides behavioral features such as voice confirmation and signature stoke form.

Biometricss refers to the automatic designation of a individual based on his alone features. This designation method of biometric is preferred over traditional methods affecting watchwords and pins for several grounds, which including the individual to be identified is required to be physically present at the point of designation, which enforce more security. The designation based on biometric techniques eliminates the demand to retrieve a watchword or transport a item. With the increased usage of computing machines as Mobile of information engineering, curtailing entree to sensitive or personal informations is necessary. By replacing pins and or watchwords, biometric techniques can potentially forestall unauthorised entree to or deceitful usage of the system. Passwords may be forgotten, and token-based designation methods such as passports and driver ‘s licences may be obtain as sham, and could be stolen, or lost. Therefore, biometric systems of designation are basking a new involvement. ( Petrovska Chollet, & A ; Dorizzi, 2009 ) . We can reason that the biometric engineerings will play a critical function in the security to supply the extremely secured designation and personal confirmation solutions.

The Technology of the Biometric

The most of import difference between biometric and traditional engineerings lies in the consequence of the biometric system to an hallmark or designation of petition. Biometric system does non give the merely yes or no reply for hallmark procedure. While the watchword could be either ‘abcd ‘ or nil and the card PIN could be valid or non, no biometric system can verify the individuality or place a individual perfectly. The individual ‘s signature ne’er be perfectly the same and the place of the finger on the fingerprint reader will change every bit good and facial look and clamber coloring material ( slice or fire tegument ) can be change. Alternatively, we are told how similar the current biometric informations is to the record stored in the database. Thus the biometric system really tells us ‘what is the chance that these two biometric samples come from the same individual ‘ . ( Biometric Authentication Report 2000 )

The Physical locks can protect the hardware, and watchwords can protects the information, which is presently the most popular manner to protect informations on system in the company or any administration. Biometricss can increase the company ‘s ability to protect its sensitive informations by implementing a more secure key than a utilizing watchword as a safety guard utilizing biometries, besides allows a hierarchal construction of informations protection, doing the informations even more unafraid and Biometric engineerings further aid to heighten security degrees of entree control form the informations to any topographic point or country. ( Biometric Security Technology )

“ Biometric systems require controlled and accurate registration procedures, careful monitoring of security scenes to guarantee that the hazard of unauthorised entry is low, and well-designed interfaces to guarantee rapid acquisition and matching. Poor system design and execution can decelerate down the hallmark procedure and expose new exposures ” .

( Intrernational Biometric Group 2003-2010 )

The Authentication Processes

Bolle et Al ( 2002 ) describes in “ Biometric Perils and Patches ” the biometric hallmark procedure is a form acknowledgment system and consists of four stairss registration, storage, acquisitions and matching.

Petrovska et Al ( 2009 ) besides describe that the biometric applications relate to the acknowledgment of persons in four possible ways:

Confirmation of individuality, this mean the individual is the same as who is claiming to be.

Non-identification, this will look into that the individual who is look intoing is non enrolled on the system before and on database.

Closed-set designation, acknowledging a individual by utilizing one of the features which is being the closest lucifer to a individual on a maestro database of such features.

Open-set designation, this means that the individual is non that who claim to be and rejecting as a bogus individuality or executing closed-set designation to fit the features.

Public Perceptions of Biometric usage

We will include some public perceptual experience about the usage of the Biometric in day-to-day life. Moody J ( n.d ) has described in his article “ Public Perceptions of Biometric Devices ” about public sentiment of utilizing biometric device. The consequences of the study exemplify how different and even conflicting public sentiment is sing the usage of biometries. On responded of the 300, 6 % had of all time used one of the biometric devices. If we see the public perceptual experience about eh usage in different topographic point bulk will prefer to hold biometric engineering for the infirmary records ( figure 1 ) and there is above norm that people would besides wish to utilize to track working hours and for logon.

Figure 1 – ( 5=Strongly Agree, 3=Neutral, 1=Strongly Disagree )

Public Percptions of Acceptable Uses of Biometricss

Beginning: hypertext transfer protocol: //

Moody ( n.d ) besides carried out some study about the usage of the biometric on different administration such as if the biometric is required on offices entree most people in office would prefer to utilize fingerprint to logon to the office ( figure 2 ) .

Figure 2 – Credence of Biometric devices on logon to Office

Beginning: hypertext transfer protocol: //

Form the above study we conclude that non much people are familiar or did non utilize the biometric system. The study besides conclude that fingerprints is more widely accepted, convenient and dependable than other signifiers of physical designation, particularly when utilizing engineering. In fact, the study has shown that fingerprint designation is presently thought to be the least intrusive of all biometric techniques, and most people who are likely to utilize biometries will prefer to utilize a fingerprint scan device for their entree to the office or logon to the personal computing machines.

Harmonizing to the International Biometric Group ( 2008 ) the Digital fingerprints continue to be the chief biometric engineering in footings of market portion, stand foring about 50 % of entire gross revenues. Facial acknowledgment, with 12 % of the market, has overtaken manus acknowledgment, which was antecedently the 2nd biggest gross generator after digital fingerprints.


Fingerprint biometries is the most common signifier of the biometries available today. Fingerprint acknowledgment has been used for designation related intents over the last several decennaries. Fingerprint acknowledgment is the engineering that verifies the individuality of a individual based on the fact that everyone has alone fingerprints. The fingerprint biometric is an machine-controlled digital version of the old ink and paper method used for more than a century for designation. The fingerprint engineering is most mature type of acknowledgment in this industry, and it s high degree of truth among other biometries ( Petrovska et al 2009 ) . The low cost and little size of the scanning device for the fingerprint scan, is leting its usage in wide scope of application. The fingerprint is simple and easy to put in and utilize. It can affect usage of a Si scanner that electronically reads the minutiae points on the coil, arches, and loops that make up a fingerprint, or an optical scanner that takes a image of the finger. Minutiae are local discontinuities in the fingerprint form ( Calderon & A ; Subbaiah 2003 ) .

Most automatic systems for fingerprint comparing are based on minutiae matching. Minutiae are local discontinuities in the fingerprint form ( figure 5 ) that interrupt the smooth flow of ridges, and are the footing for most finger-scan hallmark.

Figure 3 – Minutia

Beginning: hypertext transfer protocol: //

Many types of minutiae exist, including points ( really little ridges ) , islands ( ridges somewhat longer than points, busying a in-between infinite between two temporarily divergent ridges ) , ponds or lakes ( empty infinites between two temporarily divergent ridges ) , spurs ( a notch protruding from a ridge ) , Bridgess ( little ridges fall ining two longer next ridges ) , and crossing overs ( two ridges which cross each other, figure 3 ) . When acknowledgment is in procedure, a high quality images is captured and compared with bing image pattern templet. ( Article: Principles of Fingerprint Biometric )

Petrovska et Al ( 2009 ) besides describe the six major fingerprint categories: ( a ) arch, ( B ) tented arch, ( degree Celsius ) left cringle, ( vitamin D ) right cringle, ( vitamin E ) coil, and ( degree Fahrenheit ) twin-loop ( figure 6 ) .

Figure 4 – The six major fingerprint categories

Beginning: Petrovska, Chollet, & A ; Dorizzi 2009. Steer to Biometric Reference Systems and Performance Evaluation. London: Springer. P. 56

Figure 5 – Fingerprint Verification Process

Beginning: Beginning: Petrovska, Chollet, & A ; Dorizzi 2009. Steer to Biometric Reference Systems and Performance Evaluation. London: Springer. P. 53

The chief faculties of a fingerprint confirmation system is fingerprint detection, in which the fingerprint of an person is scan by a fingerprint scanner which produce a natural digital representation of the fingerprint ; so pre-processing will be done, in which the input fingerprint image is enhanced and adapted to simplify the undertaking of feature extraction ; and so characteristic extraction, in which the fingerprint image is further processed to bring forth discriminatory belongingss, besides called characteristic vectors ; and eventually the matching procedure, in which the characteristic vector of the input fingerprint is compared against one or more existing templets ( figure 5 ) . The templets of sanctioned users of the biometric system, besides called clients, are normally stored in a database. Clients can claim an individuality and their fingerprints can be checked against stored fingerprints, which has been enrolled on the system ( Petrovska et al 2009 ) .

Facial Recognition

Face acknowledgment is the preferable manner of individuality acknowledgment by worlds: it is natural and robust. The construct of acknowledgment to person utilizing facial characteristics is sensitive. Biometric face acknowledgment makes facial acknowledgment a more machine-controlled and computerised procedure. Since face can be captured from some distance off, facial acknowledgment can be done without the physical contact of the individual ( shorter the distance higher the efficiency ) . Under tightly controlled conditions, face acknowledgment systems can now accomplish truth degrees of 95 % . However, in the existent universe, factors such as motion, illuming and camera angle, make it hard to capture facial images that can be interpreted by the package ( Biometric and Security 2001 ) .

What sets apart facial acknowledgment from other biometries is that it can be used for observation intents. For illustration, public safety governments want to turn up certain persons such as wanted felons, suspected terrorists, and losing kids. Facial acknowledgment may hold the potency to assist the governments with this mission ( Wechsler 1998 ) .

Figure 6 – Face Recognition country

Beginning: hypertext transfer protocol: //

The facial acknowledgment uses typical facial characteristics, including upper lineations of oculus sockets, countries around zygomatic bones, the sides of the oral cavity and the location of the olfactory organ and eyes. Most engineerings avoid countries of the face near the hairline so that hairdo alterations wo n’t impact acknowledgment ( figure 6 ) . When the computing machine is executing the matching procedure, it is more subjective. When an image is captured, it will be verified by overall facial construction, which works good over short distance but increasingly loses truth as the distance goes farther between the user and the scanner. Such method of biometric is frequently less dependable so more common signifier such as fingerprints but such type of method comparatively frequently used in several airdrome terminuss and at many boundary line traversing to assist find the individualities of persons at a distance who may be involved in condemnable activities without alarming the person that they are being monitored ( Biometric A Look at Facial Recognition 2003 ) .

Iris Scan

Iris scanning steps the flag form in the colored portion of the oculus, utilizing the close circuit camera. Iris forms are formed indiscriminately. As a consequence, the flag forms in a individual ‘s left and right eyes are different, and so are the iris forms of indistinguishable twins ( Biometric a Look at Facial Recognition 2003 ) .

Figure 7 – Iris Form

Beginning: hypertext transfer protocol: //

The oculus image of the individual obtain utilizing flag from the input device on the first phase. The device used is comprised of camera to capture the oculus image and lighting and image detector to capture the good flag forms. After capturing the oculus image, the iris country should be extract right so that the individual ‘s individuality verify more accurately ( figure 7 ) . Detecting the interior boundary of the flag against the student and the outer boundary line of the flag against the sclerotic coat finishes the procedure. After the iris country is extracted, the different method sis used for the matching of iris characteristics. Iris scanning can be used rapidly for both designation and confirmation applications because the flag is extremely typical and robust ( IDTECK 2009 ) .


Security is one of the of import issues in any facet of day-to-day life. Security can be measure by utilizing different manner medium depend upon the construction. Increasing security concerns runing from single individuality larceny, corporate security, to even national security represents factors that are of import to the biometries market. Biometricss identify people by mensurating some facet of single physiology such as your manus geometry or fingerprint etc or other behavioural characteristic such as your handwritten signature, or can be combination of the both of two. Biometric engineering identifies persons automatically by utilizing their biological or behavioral features.

As in study the Moody J ( n.d ) describe about the public perceptual experience of the usage of biometric engineering on different public topographic points. On decision of the perceptual experience people feel more comfy to utilize the fingerprint engineering for the biometric intents. So to plan and implement the biometric application we will utilize fingerprint engineering to implement security in a company to let employee to time in to the occupation utilizing fingerprint to corroborate their individuality. And camera will besides be usage to capture the individual image for the matching intent.

The hallmark procedure of the fingering is based on the confirmation of the individual ‘s individuality that the individual is the same as who is claiming to be, and so it will look into that the individual dosage have privileges it use the installations.

Chapter 3 – Analysis


The analysis is a chief to understand the application job for developer, user and perceiver. This chapter will depict the demand specification from the information gathered in Literature reappraisal. Assorted techniques and tools are used here to transport out the analysis. This may include the UML usage instance, Modelling and MoSCoW etc. And so finalize the functional and non functional demands.


The literature reappraisal discussed country refering about the different type of biometric engineering and the serviceability of the biometric engineering in the practical life. As survey shows that people feel more comfy to utilize fingerprint engineering so that we use fingerprint reader for designation intent and along with the camera to capture the individual ‘s image for fiting intents.

Use Case

The intent of this phase is to pattern the system demand. This will affect the UML usage instance diagram which helps to capture the functional demand of the system. The intent of the usage instance is to specify a piece of effectual demand of the system without vilifying the internal construction of the system. In this instance as we developing biometric Clock In and Access Control security merchandise, so each usage instance stipulate a service that the system provides to its users that is, a specific manner of utilizing the system that is seeable outside ( figure 8 ) .

Use Case Diagram

Figure 8 – Use Case Diagram

Use Cases Description

Administrator Staff – A member of employee plants as an Administrator employee and supply services to the general employee.

General Staff – A member of employee, work as a general employee.

Fingerprint Reader – A biometric fingerprint device which uses as to register and verify the individuality of the user.

Camera – A digital Delaware frailty to take image of the user as an individuality intent.

Primary Scenario

The Primary scenario for the usage instances are described below.

Use Case: Enrol Employee

Precondition: The application should be get down on the system and an employee should hold been registered as an decision maker employee on to the system and fingerprint and camera should attach to the system.

Actors: Administrator employee, Fingerprint reader and camera.

Flow of Events:

Primary Scenario

The usage instance starts when decision maker employee logged in to the system with valid fingerprints utilizing fingerprint reader.

The decision maker employee will open the employee enrollment signifier and make full all needed item for the intended registry employee.

The decision maker will get down the camera to capture image for the intended registry employee.

The decision maker will put the fingerprint reader to register intended registry employee finger.

The intended registry employee will put his finger on the fingerprint reader.

The fingerprint reader will capture the fingerprint and make templet of the fingerprint.

The decision maker employee will guarantee all the inside informations are filled and so continue to salvage the inside informations.

The system will inscribe the item of the intended registry employee, the new employee will register on the system and so utilize instance terminals.

Postcondition: The new employee registry on the system and employee Idaho is given to the registry employee.

Use Case: Delete Employee

Precondition: The application should be get down on the system and an employee should hold been registered as an decision maker employee on to the system and fingerprint reader should attach to the system.

Actors: Administrator employee.

Flow of Events:

Primary Scenario

The usage instance starts when decision maker employee logged in to the system with valid fingerprints utilizing fingerprint reader

The decision maker employee will open the delete employee signifier.

The decision maker employee will come in the employee Idaho to seek for the particular record for omission.

The decision maker employee will choose the id signifier the signifier and the imperativeness delete to cancel the employee from the system and so employee will cancel from the system and omission verification message will be appear on the screen and so utilize instance terminals.

Postcondition: The employee delete from the system and verification message will expose.

Use Case: Generate Reports

Precondition: The application should be get down on the system and an employee should hold been registered as an decision maker employee on to the system and fingerprint reader should attach to the system.

Actors: Administrator employee.

Flow of Events:

Primary Scenario

The usage instance starts when administrator staff logged in to the system with valid fingerprints utilizing fingerprint reader.

The decision maker staff will open the generate signifier options.

Then decision maker staff will choose the study form the different options

Then selected study option will look with the related record on the study and so utilize instance terminals.

Postcondition: The selected study will be generate and show to the screen.

Use Case: Employee Clock In/Out

Precondition: The application should be get down on the system and fingerprint reader should attach to the system.

Actors: Administrator employee, normal employee and fingerprint reader.

Flow of Events:

Primary Scenario

The usage instance starts when employee selects the clock in and time out option on application.

Then clock in screen will look and so employee will choose the needed option either clock in or time out.

Then the confirmation signifier should look to the screen with motivating to put the finger on the reader.

Then the employee will put the finger on the reader and so fingerprint reader will verify the employee individuality.

Then employee returns to the selected option either clock in or time out.

Then a message will expose that employee has been logged in or logged out tot the system and employee item added to the chief signifier for information and so utilize instance terminals

Postcondition: The employee logged successfully to the system.

Fingerprint Device

The fingerprint device will be usage for the biometric intents in the development phase. The DigitalPesona fingerprint along with its SDK is being used to develop the application.

Camera Device

To do the system more secure, the camera device is used to capture the user image as one for the individuality intent. The camera will capture the image along with the fingerprint of the user.

Requirement Specification

The demand specification will split into three parts, General Requirements which includes the easiness of usage of the system and method of deployment. Second, Functional Requirements, which is straight, related to the functionality of the system and so thirdly the non functional demand that are related to public presentation and quality of the developed merchandise.

General Requirements

These demands are related to the environment in which system is traveling to be used and users interacting with the system. The demands of the application include:

User interface should be really clear and friendly to utilize on all the GUI phases oh the application.

The system should let registered user to time in and out.

The registered user should be able to verify their finger on fingerprint without confronting troubles.

Functional Requirements

As the name suggests, these demand are straight related to the functionality of the system. By analyzing the usage instance for the system we describe the undermentioned functional Requirement which are listed below.

The system should let decision maker employee to inscribe the new employee.

The system should non let general employee to entree to the decision maker employee options.

The decision maker employee should able to pull off employee.

The system should able to pull out and fit the user fingerprint informations which already been stored on the database side.

The system should able to capture the exposure of the new employee on employee enrollment stage.

The General employee should be able to time in and time out to the system utilizing fingerprint reader.

The decision maker employee should able to cancel the employee record organize the system.

The system should non let employee to clock in, who is already clock in to the system.

The system should non let employee to time out who is already clock out to the system.

The decision maker employee should be able to bring forth the studies.

Non-Functional Requirements

The system should be able to manage at least 100 employees clocked in on the system. The decision maker employee should be able mange inside informations of the registry employee on the system.

If any mistake occurs the application must be able to manage the mistake in friendly manner.

The response clip of the fingerprint reader to read the fingerprint of the registry employee and verifying, should be speedy.

MoSCoW Rule-Prioritise Functionality

To prioritize the functionality of the system we use MoSCoW regulation perform this.

Musts Have:

The system must be able to time in and time out employee utilizing fingerprint reader.

The system must hold process to inscribe new employee to the system.

The system should be able to cancel staff inside informations on the system.

Should Have:

The system should be able to execute fingerprint confirmation procedure.

The system should be able to capture the image of the employee as one of the individuality.

The system should be able to pull out informations from the database and able to verify the minutiae of the registered employee and response whether they are same or non.

Could Have:

The system may hold the both option like fingerprint and Facial Detection to inscribe and time in to the system.

The system may hold option to time in or time out utilizing watchword if fingerprint reader is non attach.


This chapter is focus to analyze the information and produced the demands for the system. The UML usage instance diagram has been drawn to name the demand of the system. The usage instances show that how the system should be behave. All the demands tell what the system should make. These demands will be based for the following chapter to plan the system, and designed system should run into the demands which are listed in this chapter.

Chapter 4 – Design


This chapter describe the coveted package characteristics in item, and by and large include functional hierarchy diagrams, screen layout diagrams, UML diagrams. These design elements are intended to depict the package in sufficient. This chapter focuses on the design of the application which involves all the undertakings which need to be carried out in order to construct the system. Class diagram, sequence diagram has been used as patterning techniques to execute design of the application. Entity relationship diagram is besides used to plan the database terminal.

Class Diagram

The category diagram has been drawn to depict the construction of a system by demoing the system ‘s categories, their properties, and the relationships between the categories. Class diagram contains the properties and operations used in a category. This diagram represents the interrelatedness between objects and categories ( figure 9 ) .

Figure 9 Class Diagram

Description of Classs

Sequence Diagram

UML sequence diagrams model the flow of logic within the system in a ocular mode ; it helps to enabling to both papers and formalize the logic of the system as they show the flow of procedures go oning inside the system consecutive. Its will clearly stand for the how the message will go through underlying procedure between the objects at a peculiar clip.

Launch Application

Figure Sequence Diagram of Launch Application

Clock In to System

Figure Sequence Diagram for Clock In to System.

Register Employee

Fingerprint Reader

The digitalPersona fingerprint reader is usage for the fingerprint registration on the system and to verify the individual ‘s individuality. The reader is used with digitalPersoan package development kit. The fingerprint reader connects to the application to execute the enrolling and confirmation procedure. The application gaining control the fingerprint of the user and utilizing fingerprint reader and uses the typical and relentless features from the ridges of the fingerprints, and besides referred to as fingerprint characteristics, to separate one finger ( or individual ) from another.

Fingerprint SDK

The One Touch SDK package development tool enables to incorporate fingerprint biometries applications. The tool enables to execute basic fingerprint biometric operations: capturing a fingerprint from a DigitalPersona fingerprint reader, pull outing the typical characteristics from the captured fingerprint sample, and hive awaying the ensuing informations in a templet for later comparing of a submitted fingerprint with an bing fingerprint templet.

The implicit in procedure of the inscribing fingerprint and confirmation are shown in the diagram

Figure Enrolling Fingerprints

Beginning DigitalPersona SDK

Figure Verification of fingerprints

Beginning DigitalPersona SDK

Perform by DigitalPersona SDK

Not execute by DigitalPerosna SDK

Graphical User Interface Design

Planing the user interface can be critical in the development of a system. The interface is what the users see. To them it is system. The user interface should unclutter and convenient to utilize. The interface should be provided with aid throughout the application. The pilotage and visual aspect of the application should be clear and should go through information to the user that how system can be used. The attitude towards the full system can be coloured by there experienced of the users interface.

Proposed Design of the of Main Interface

The application chief header will be on the top to expose the system name. Two buttons are design on the chief screen to execute the coveted action. A container is added to the underside of the interface to demo the current employee on the occupation

Main Heading of the Application

Administrator Options

Button with image show

Clock In and Clock Out Options

Button with image show

To demo the Current Employee on Job

Figure Main Interface

Proposed Design of the Clock in and Clock out interface

The clock in and time out interface is design by exposing the current day of the month and current clip in box along with image box to expose the successful login employee image. The two buttons are added to the interface to time and out to the system

Display Employee image on successful login

Current Date Box

Current Time

Clock in Button with image show

Clock Out Button

With image show

Figure Clock in Display

Proposed design of the Employee Registration interface

The employee enrollment signifier is design with all needed field for the employee enrollment on the system along with the fingerprint enrollment and camera operate buttons. The two more buttons are added to salvage and go out signifier the employee enrollment interface

Employee FName

Employee LName

Employee Email

Employee Phone


Confirm Password

Department List

Employee Type List

Date Pick Box

Contract Type List

Register Fingerprint


Check box

Picture Box

Camera choice list

Start Camera Button

Take image


Save button

Exit Button

Figure Registration interface

Administrator Options Interface

Proposed Design of the Clock in and Clock out interface

The clock in and time out interface is design by exposing the current day of the month and current clip in box along with image box to expose the successful login employee image. The two buttons are added to the interface to time and out to the system.

Display Employee image on successful login

Current Date Box

Current Time

Clock in Button with image show

Clock Out Button

With image show

Figure Clock in Display

Database Design

Database design is the procedure of bring forthing a elaborate information theoretical account of a database. The database architecture is design with the aid of utilizing entity relationship diagram, category diagram of the database and relational scheme of the database

Entity Relationship Diagram

Figure Entity Relationship Diagram

Relational Schema

Figure Relational scheme

Class Diagram for the Database






Appendix A

Appendix B

Undertaking Proposal


The Design and Implement of Biometric Application to enable security.


Different types of Access Control systems have been developed in the market in the past old ages by utilizing different engineerings such as computer keyboard, cardinal card or swipe card reader. Unfortunately, these types of security entree can merely supply limited security because of its easiness of duplicate so that unauthorized user can entree to the system without any troubles. Security is now going a more of import issue for concern, and the demand for hallmark has hence become more of import than of all time. In order to supply high security, a alone security system should replace by utilizing some alone entree system. Biometric engineering, which uses human alone features for the acknowledgment and therefore supply the highest quality of security. ( Petrovska, Chollet, & A ; Dorizzi, 2009 )

“ A method of verifying an person ‘s individuality based on measuring of the person ‘s physical characteristic ( s ) or quotable action ( s ) where those characteristics and/or actions are both alone to that person and mensurable ”

( Schultz 2001 )

Harmonizing to the National Institute of Standards and Technology ( 2003 ) , “ Biometricss in the sense used today in information engineering refers to the automatic acknowledgment of a individual based on physiological or behavioral features ” . Biometric Security supplying the best security method than any other entree method. The chief advantage of biometric designation is its non-transferable engineering that a individual ‘s biometric feature is of course attached to them and therefore can non be stolen or duplicated, copied or Lent to other people. Another advantage is, it is convenient to entree as it is ever with the user wherever user goes. There are many manner has been developed e.g. face acknowledgment, finger print reader, DNA acknowledgment, facial acknowledgment.


The purpose of this undertaking is to plan and implement biometric application to enables the security.

Key Phrases

Biometric Technology, Type or Methods of Biometric, Fingerprint Technology, Biometric Security for Business Purposes, Privacy


To look into how to plan and implement biometric application.


Search for the literature.

Read literature about biometric which enable the security.

Write literature reappraisal.

Deliverables: Section of study of literature reappraisal. 1000 – 1500 words.

To analyze the information gathered to bring forth the demand specification.


Read information gathered.

Choice appropriate tools and engineering in order to drive analysis and requirement specification.

Deliverables: Section of study of analysis. 1000 – 1500 words.

To Plan the biometric application to fit the demand specification.


Choice appropriate methods and design scheme.

Draw up design theoretical account.

Deliverables: Section of study of design certification. 1000 – 1500 words.

To implement Biometric application that has been design in planing stage.


Choose the appropriate scheduling tool to implement the Biometric application.

Implement the characteristics which have been described in design.

Deliverables: Section of study of implement certification. 1000 – 1500 words and present merchandise.

To prove the enforced system to guarantee that the system is utile and fulfils the set of demands.


Choose the trial scheme to prove the system.

Draw up trial program and trial instances.

Perform the trial utilizing trial instances.

Deliverables: A subdivision of Test study with the figure of different consequences. 500 – 1000 words

Critically measure the work carried out throughout the undertaking.


Critically appraisal of the personal experience.

Assess how good you perform to transporting out the undertaking.

Deliverables: Section of decision. 500-700 words

To reexamine bill of exchange transcript of the undertaking papers.


Check papers for mistake error.

Check format of whole papers.

Check overall papers presentation.

Deliverables: Final Copy of undertaking papers.

Required Resources

Entree to Internet, Access to the Library ( Public and College ) , Standard Personal computer ( Minimum Pentium Processor ) , Windows Platform ( XP, Vista of Win 7 ) , Database Tool ( such as Microsoft Access, MySQL ) , Software Development Tool ( Visual C # Visual Studio, Java, .NET ) , Fingerprint Reader Device.

Initial Mentions

Tech Biometric. 2009. Biometric Solution Provider Available at: hypertext transfer protocol: // [ Accessed 25 July 2010 ]

Vielhauer, C. 2006. Biometric user hallmark for IT security: from basicss to handwriting. USA: Springer.

Petrovska, D. Chollet, & A ; Dorizzi, G B. 2009. Steer to Biometric Reference Systems and Performance Evaluation. London: Springer.

Larsen, K R. & A ; Voronovich, Z. A. 2004. Technology and Privacy in the New Millennium. USA: Ethica Printing