CFP last date
20 January 2025
Reseach Article

Machine Learning Biometric Attendance System using Fingerprint Fuzzy Vault Scheme Algorithm and Multi-Task Convolution Neural Network Face Recognition Algorithm

by Patrick Cerna, Mary Charlemaine Abas, Haftom Gebreziagbher, Mesay Mengstie
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 48
Year of Publication: 2018
Authors: Patrick Cerna, Mary Charlemaine Abas, Haftom Gebreziagbher, Mesay Mengstie
10.5120/ijca2018917202

Patrick Cerna, Mary Charlemaine Abas, Haftom Gebreziagbher, Mesay Mengstie . Machine Learning Biometric Attendance System using Fingerprint Fuzzy Vault Scheme Algorithm and Multi-Task Convolution Neural Network Face Recognition Algorithm. International Journal of Computer Applications. 179, 48 ( Jun 2018), 1-6. DOI=10.5120/ijca2018917202

@article{ 10.5120/ijca2018917202,
author = { Patrick Cerna, Mary Charlemaine Abas, Haftom Gebreziagbher, Mesay Mengstie },
title = { Machine Learning Biometric Attendance System using Fingerprint Fuzzy Vault Scheme Algorithm and Multi-Task Convolution Neural Network Face Recognition Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2018 },
volume = { 179 },
number = { 48 },
month = { Jun },
year = { 2018 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number48/29497-2018917202/ },
doi = { 10.5120/ijca2018917202 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:58:38.734216+05:30
%A Patrick Cerna
%A Mary Charlemaine Abas
%A Haftom Gebreziagbher
%A Mesay Mengstie
%T Machine Learning Biometric Attendance System using Fingerprint Fuzzy Vault Scheme Algorithm and Multi-Task Convolution Neural Network Face Recognition Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 48
%P 1-6
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In many higher education institutions in particular in Africa including Ethiopia proper attendance monitoring is a very important criteria in providing quality to promote student satisfaction. Biometric technology offers an advanced verification for employees used in most schools and companies. A prototype using biometric technology has been proposed to facilitate the recording of the employees’ attendance and generate automatically the payroll The prototype utilize Adafruit Fingerprint Fuzzy Vault scheme algorithm through Raspberry Pi 3, Pi Camera for face detection and recognition using Multi-task Convolution Neural Network (MTCNN) Method and output simulated through MATLAB respectively. A user interface module was develop using Visual Basic where fingerprint and face registration is done and during logging with the prototype. The resulting prototype was tested in the non-academic staff of Federal TVET Institute, an institute of higher learning specializing Technical Vocational Education and Training (TVET) offering both undergraduate and postgraduate program in Addis Ababa, Ethiopia.

References
  1. Acroprint 2018. Why Employees (Should) Love Time and Attendance. Retrieved from https://www.acroprint.com/newsletter-archives/2012-10.php. Accessed February 2018.
  2. Gale, F. S. 2013. Employers Turn to Biometric Technology to Track Attendance. Retrieved from http://www.workforce.com/2013/03/05/employers-turn-to-biometric-technology-to-track-attendance/. Accessed February 2018.
  3. K.Senthamil Selvi, P.Chitrakala, A.Antony Jenitha, Face recognition based Attendance marking system IJCSMC, Vol. 3, Issue. 2, February 2014, 337 – 342
  4. Oloyede MO, Adedoyin AO, Adewole KS (2013) Fingerprint Biometric Authentication for Enhancing Staff Attendance System. International Journal of Applied Information System 5: 19-24.
  5. Punitha, K. 2017. Enactment of Face Recognition Algorithm for Attendance System. International Journal of Applied Engineering Research. Vol 12, Issue. 4.
  6. Patil, P., Khachane, A and Purohit, V. 2016. A Wireless Fingerprint Attendance System. International Journal of Security, Privacy and Trust Management. Vol 5, Issue 4
  7. Chandramohan, J, Nagarajan R., Kumar, M., Dineshkumar, T., Kannan, G., and Prakash, R. International Journal of Advanced Engineering, Management and Science, Vol 3, Issues 3
  8. Muhammad Fuzail, Hafiz Muhammad Fahad Nouman, Muhammad Omer Mushtaq, Binish Raza, Awais Tayyab, Muhammad Waqas Talib 2014. Face Detection System for Attendance of Class’ Students. International Journal of Multidisciplinary Sciences and Engineering, Vol. 5, Issue 4.
  9. Mathana Gopala Krishnan, Balaji, Shyam Babu 2015. Implementation of Automated Attendance System using Face Recognition. International Journal of Scientific & Engineering Research. Volume 6, Issue 3
  10. S. B. Dabhade, Y. S. Rode, M. M. Kazi, R. R. Manza and K. V. Kale 2013. Face Recognition using Principle Component Analysis and Linear Discriminant Analysis
  11. Comparative Study. 2nd National Conference on Advancements in the Era of Multi-Disciplinary Systems
  12. S. Li and A. C. Kot 2013. Fingerprint Combination for Privacy Protection. IEEE Transactions on Information Forensics and Security, Vol. 8, No. 2, 350- 360
  13. M. J. Jones and P. Viola 2006. Method and System for Object Detection in Digital Images. US Patents 7 099 510.
  14. A. Saliha, B. Karima, K. Mouloud, D. H. Nabil, and B. Ahmed 2014. ExtractionMethod of Region of Interest from Hand Palm: Application with Contactless and Touchable Devices. 10th International Conference on Information Assurance and Security (IAS), 77-82.
  15. L. Ghoualmi, A. Draa, and S. Chikhi, 2015. An Efficient Feature Selection Scheme Based on Genetic Algorithm for Ear Biometrics Authentication. 12th International Symposium on Programming and Systems (ISPS), pp. 1-5
  16. A. Saliha, B. Karima, K. Mouloud, D. H. Nabil, and B. Ahmed 2014. Extraction Method of Region of Interest from Hand Palm: Application with Contactless and Touchable Devices,” in Proc. 10th International Conference on Information Assurance and Security (IAS), 77-82.
  17. Ari Juels and Madhu Sudan 2002. A Fuzzy Vault Scheme. IEEE International Symposium Information Theory, Lausanne, Switzerland, 408, 2002.
  18. Clancy, D Lin and N Kiyavash 2003. Secure smartcard-based fingerprint authentication. Proceedings of ACM SIGMM Workshop on Biometric Methods and Applications, Berkley, CA, 45-52
  19. Cengiz Orencik 2008. Fuzzy Vault Scheme for Fingerprint Verification: Implementation, Analysis and Improvements. Thesis. Sabanci University
  20. Hoi Ting Poon and Ali Miri 2008. A Collusion Attack on the Fuzzy Vault Scheme”, University of Ottawa, ISC, 27-34.
  21. Sumin Hong, Woongryul Jeon, Seungjoo Ki, Dongho Won, Choonsik Park (2008). The Vulnerabilities Analysis of Fuzzy Vault using Password. Proceedings of IEEE, Vol. 3, 76-83.
  22. Hinton GE, Osindero S, Teh Y-W 2006. A fast learning algorithm for deep belief nets. Neural Comput 18(7): 1527–1554
  23. Sannella, M. J. 1994. Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398., University of Washington.
  24. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  25. Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  26. Y.T. Yu, M.F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  27. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender.
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics Fingerprint Authentication Deep Learning Face Recognition Machine Learning