Académique Documents
Professionnel Documents
Culture Documents
Chapter 1
INTRODUCTION
Opening Doors
1.2 Objectives
"he main aim of our pro(ect is to build an application based on I)I* of a particular individual. "his application will help to the faculty of college+institutes to maintain the attendance of the students easily. "his pro(ect will also easily monitor the monthly attendance for each student and will reduce the teachers$ efforts.
&ig$re 1.1 ' Anatomy of the human eye. %ormation of the iris begins during the third month of embryonic life. "he unique pattern on the surface of the iris is formed during the first year of life, and pigmentation of the stroma ta es place for the first few years. %ormation of the unique patterns of the iris is random and not related to any genetic factor. "he only characteristic that is dependent on genetics is the
3
Chapter ,
+RO,-CT D-&INITION
Getting Started
2.2 .co(e
"he modules to be covered by this application are as under0 1. 3elcome screen ,. 4atabase provider ,.1 5* Access ,., 6racle ,.7 *89 *erver 7. Connectivity :. 4ata fetch 5odules which are not in scope0 1. Currently this application will support images ta en from a digital camera. 2. "his application is no applicable to videos.
2. !((ro"ch
1. "a e the eye image of a student from a digital camera. ,. ;enerate the iris code and store it in the database for that particular student. 7. *tore bit pattern for all the students. :. In real time, capture the eye image of a student, generate the iris code for it and compare it with the existing database.
Chapter 7
B!C01ROUND R-.-!RC#
Automation System for Students Attendance using IRIS Recognition System The motivation to work ahead
.1 2otiv"tion
%or verification of a person various parameters are used such as identity card, etc. #iometrics provides an alternative to these methods, or they can be used in combination multimodal>. %ingerprints, which are widely used, can be forged ?gummy fingers>. "he face changes over a period of time, even with the best algorithms face recognition ?for faces ta en one year apart> has error rates of about :7 to <- . , hand geometry is not distinctive enough to be used in large scale applications, hand1written signatures can be forged. "he iris is different for any two individuals even for identical twins@ 4=A is not unique among identical twins. "he process of capturing the iris image is not intrusive. Iris images can be computer matched more accurately than a face image, and it$s ac nowledged that iris recognition is more accurate than any other biometric technique, although there are some concerns regarding enrollment failure rates ?capturing the initial iris image to be used as a template for comparing with other images>. "he failure to enroll rate ?%"E> is the rate at which a biometric system fails to enroll a sub(ect$s biometric sample. "he process of enrolling a sub(ect for the first time requires some training. "hese are some of the reasons that ma e the iris recognition technology suitable for applications in which the user is cooperative.
.2 -3isting 4or5s
9
10
something you have ?smart to en or access card>, and something you are ?biometric>. #iometrics can be used alone or in con(unction with one of the other factors to strengthen the security chec . #iometric technology has advantages over both of the other factors in that the user does not need to remember anything or possess a physical to en in order to be identified. "o ens and cards can be lost, and passwords and BI=s can be forgotten or compromised. A biometric is only susceptible to forgery, which can be extremely difficult, depending on the biometric. Iris recognition falls into the physical biometric category as opposed to behavioral biometrics such as signatures. 6ther physical biometric technologies include fingerprinting, retinal scanning, spea er recognition, and facial scanning and hand geometry. "he =ational Center for *tate Courts ?=C*C> published information comparing these physical biometric methods.,- "he =C*C data is substantiated by a similar comparison table found at the IEEE Computer *ociety.,1 &ere are some highlights from both groups$ findings. &inger(rinting Iris recognition shares many characteristics with fingerprinting. #oth biometric technologies are reliable and very accurate, but iris recognition has a much lower error rate ?1 in 171,---> than fingerprinting ?1 in <--I>.,, ?"he =C*C defines error rate as the crossing point of the graphs of false positives and false negatives of a particular biometric.> #oth biometric methods can be used to verify that a person is who he or she claims to be and to identify a person by comparing the current biometric input to a large set of data that was previously recorded. According to the =C*C, false positives and false negatives are difficult to produce for both fingerprinting and iris recognition.,7 %alse acceptance rates are extremely low for iris recognition. "ests conducted through 4ecember ,--- had not resulted in a single false acceptance of an iris.,: #oth fingerprints and iris are stable physical characteristics that do not change with age. &owever, since older people tend to have drier s in, fingerprints can be more difficult to verify as a person ages. %ingerprinting hardware is generally less expensive than that for iris recognition, but recent technology is lowering costs of iris recognition devices.,< External factors can cause errors in both fingerprinting and iris recognition. %ingerprints can be affected by dirt, dryness and scarring. Iris recognition can be affected by lighting. #oth technologies are
11
14
Chapter :
6IT-R!TUR- .UR7-8
15
Automation System for Students Attendance using IRIS Recognition System Expanding horizon
16
/.2.2 .egment"tion
18
/.2. 2e*i"n &ilter In signal processing, it is often desirable to be able to perform some ind of noise reduction on an image or signal. "he me*i"n filter is a nonlinear digital filtering technique, often used to remove noise. *uch noise reduction is a typical pre1processing step to improve the results of later processing ?for example, edge detection on an image>. 5edian filtering is very widely used in digital image processing because under certain conditions, it preserves edges whilst removing noise. "he main idea of the median filter is to run through the signal entry by entry, replacing each entry with the median of neighboring entries. "he pattern of neighbors is called the NwindowN, which slides, entry by entry, over the entire signal. %or 14 signal, the most obvious window is (ust the first few preceding and following entries, whereas for ,4 ?or higher1 dimensional> signals such as images, more complex window patterns are possible ?such as NboxN or NcrossN patterns>. =ote that if the window has an odd number of entries, then the median is simple to define0 it is (ust the middle value after all the entries in the window are sorted numerically. %or an even number of entries, there is more than one possible median. /.2./ Thinning
19
20
Chapter <
R-AUIR-2-NT .+-CI&IC!TION
21
Automation System for Students Attendance using IRIS Recognition System B.2 #"r*w"re !n* .oftw"re Re:$irements
#"r*w"re Re:$irements 1. 5inimum0 1.J ;&! CBC, <1, 5# )A5, 1-,:xKJ/ display, <:-- )B5 hard dis . ,. )ecommended0 ,., ;&! or higher CBC, 1-,: 5# or more )A5, 1,/-x1-,: display, K,-- )B5 or higher hard dis . 7. 4igital Camera with minimum resolution of < mega pixels. .oftw"re Re:$irements 1. *89 *erver ,--< ,. "urbo C+CII 7. .=E" %ramewor 7.< Qersion number 1 :<-J.7-
Chapter J
+RO,-CT +6!NNIN1
24
.r. No.
No. of ho$rs
&rom D"te
To D"te
25
C .ystem Design
.r. No. 1 2
N"me of .$b mo*$le .t$*y of !lgorithms Im(lement"tion of !lgorithms Design of 1UIEs .t$*y of Connectivity Testing the system on *ifferent im"ge form"t
>9 B
/9
12th 2"rch)19
2>th 2"rch)19
? @
9 9=
/C .oftw"re Testing
26
Chapter K
D-.I1N
27
Expressing ideas
28
30
31
32
Chapter /
ay it goes!
33
Automation System for Students Attendance using IRIS Recognition System >.1 .ystem Overview
"he entire system wor s (ust li e any other application using navigation controls. "he end user can navigate from one page to another and can view image and other details of the entered roll number as he wishes. "he application spans the following pages in accordance with the end user selection0 1. ,. 7. 3elcome Bage *election of the required tas 2 register+recognition If register is selected 7.1 %ill the details of the student 7., Capture his image 7.7 ;enerate the iris code and store in database :. If recognition is selected :.1 Enter the roll number to be verified. :., Capture the image :.7 ;enerate the iris code and compare with the database :.: If verified 2 mar the attendance :.< Else as him to register. <. Qiew the attendance sheet of the whole class. >.1.1 Registering " st$*ent Initially the database of the students has to be prepared, for this purpose the students have to register themselves.
34
7. "a e the eye image of the student with the specified camera. :. #rowse the photo of the student whose information is filled. <. Bress LCreate irisM. J. "he iris code will be generated. K. Bress the L*ubmitM button. "hus the iris code will be generated for the eye image of that student and will be stored with his personal information.
35
>.1.2 RecogniFing " st$*ent %or recogni!ing a student for mar ing his attendance 2 1. ;o to &ome page Computer 4epartment )ecognition. ,. Enter the roll number of the student you want to recogni!e.
7. Bress L)ecognitionM.
36
:. "he student information will be displayed. <. Bress L#rowseM to select the recent image of the student. J. Bress LCreate irisM. K. "he iris code will be generated. /. Bress LverifyM. F. According to the, the result will be displayed. 1-. If the image is already stored, then is shows LQalid *tudent. Attendance mar ed.M If not, then it as s to L)egisterM.
37
>.2. . 1ener"te the iris co*e "n* store in *"t"b"se Bage =ame0 3elcome Computer 4epartment )egister Input 6utput >.2./ 0 Clic on )egister 0 Iris code is generated and information is stored in the database. Reselection of .te(1 >.2./.1 If recognition is selecte* < Enter the roll number to be verified. Bage =ame0 3elcome Computer 4epartment )egister Input 6utput 0 #utton clic to select recognition of the specified roll number. 0 Bage with details of the student.
>.2./.2 C"(t$re the im"ge Capture the image of the student using the digital camera as specified.
39
>.2././ If verifie* ' m"r5 the "tten*"nce Bage =ame0 3elcome Computer 4epartment )ecognition Input 6utput 0 Image for recognition. 0 Qerified and attendance mar ed.
>.2./.B -lse "s5 him to register. Bage =ame0 3elcome Computer 4epartment )ecognition Input 6utput 0 Image for recognition. 0 =ot verified. )egister if not present in the database.
>.2.B 7iew the "tten*"nce sheet of the whole cl"ss. Bage =ame0 3elcome Computer 4epartment )ecognition Attendance *heet Input 6utput 0 Clic on 3elcome Computer 4epartment )ecognition Attendance *heet 0 Attendance *heet for whole class is appearing.
40
IIC Bin"rise Im"ge +T %unction name 0 binariseUimage input 0 17T17 bloc of the image array
4escription 0 Each pixel is either mar ed as - or ,<< depending upon its intensity output 0 17T17 array with each value either as - or ,<<
42
IIIC 2e*i"n &ilter +T %unction name 0 medianUfilter?> input output T+ void medianUfilter?> V int xW-,yW-,midUvalueW-,upperUboundW-@ for?xW1@xX7--@xII> for?yW1@yX7--@yII> V upperUboundW-@
44
0 17 T 17 bloc array of the input image array 0 17 T 17 bloc array with noise eliminated using median filtering
45
Chapter F
46
T-.TIN1
47
Automation System for Students Attendance using IRIS Recognition System =.2 Testing "rtif"cts
*oftware testing process can produce several artifacts Test c"se A test case in software engineering normally consists of a unique identifier, requirement references from a design specification, preconditions, events, a series of steps ?also nown as actions> to follow, input, output, expected result, and actual result. Clinically defined a test case is an input and an expected result. "his can be as pragmatic as Efor condition x your derived result is yE, whereas other test cases described in more detail the input scenario and what results might be expected. Test scri(t "he test script is the combination of a test case, test procedure, and test data. Initially the term was derived from the product of wor created by automated regression test tools. "oday, test scripts can be manual, automated, or a combination of both. Test *"t" "he most common test manually or in automation is retesting and regression testing. In most cases, multiple sets of values or data are used to test the same functionality of a particular feature. All the test values and changeable environmental components are collected in separate files and stored as test data. It is also useful to provide this data to the client and with the product or a pro(ect. Test s$ite "he most common term for a collection of test cases is a test suite. "he test suite often also contains more detailed instructions or goals for each collection of test cases. It definitely contains a section where the tester identifies the system configuration used during testing. A group of test cases may also contain prerequisite states or steps, and descriptions of the following tests. Test (l"n
48
49
50
51
=. .2 Testing Re(ort
52
1.2 Register New .t$*ent .$bject% 9ogin .t"t$s% 4esign Designer% admin Cre"tion D"te% ,-+-:+1Ty(e% 5A=CA9 1.,.1 *teps .te( N"me Descri(tion *tep 1 Entering )oll =umber student. *tep , Entering =ame of student.
53
-3(ecte* Res$lt of 6nly numbers are accepted, characters are not allowed. Characters are allowed.
2 .chem" Det"ils 2.1 +roce*$res .$bject% *chema4etails .t"t$s% 4esign Designer% admin Cre"tion D"te% ,-+-:+1Ty(e% 5A=CA9 ,.1.1 *teps .te( N"me Descri(tion *tep 1 Bress browse in the registration web page. *tep , *elect particular eye image of the respective student. *tep 7 Bress create iris code. *tep : Bress submit.
-3(ecte* Res$lt "he dialog box for choosing the image is displayed. "he eye image is displayed. "he processing of selected eye image ta es place and iris code is generated. "he generated iris code along with the entered information of the student is inserted into the database.
2.2 Recognition of " st$*ent .$bject% *chema4etails .t"t$s% 4esign Designer% admin Cre"tion D"te% ,-+-:+1Ty(e% 5A=CA9 ,.7.1 *teps .te( N"me Descri(tion -3(ecte* Res$lt *tep 1 Enter the )oll number to be "he entered information of the recognised and pressed give roll number is displayed. recognise.
54
2. 7iew the tot"l "tten*"nce .$bject% *chema4etails .t"t$s% 4esign Designer% admin Cre"tion D"te% ,-+-:+1Ty(e% 5A=CA9 ,.7.1 *teps .te( N"me Descri(tion *tep 1 "est the database. *tep ,
-3(ecte* Res$lt database is opened and attendance sheet is displayed. Qiew the present status of the Bresent *tatus of the student is student. displayed.
55
Chapter 1-
CONC6U.ION
"he system for attendance management wor s efficiently for various types of image such as .bmp, .(peg, and other formats. "his system is also built up to show the total attendance of the students. As a website, this system can be uploaded on the internet and can be viewed as a website. "hus, in total this system can be described as1 !$tom"te* 2 As it successfully monitors the attendance.
56
57
&UTUR- .CO+-
3e have wor ed sufficiently on still images for iris recognition of a person and applied it for managing the attendance. "his concept of iris recognition for still images can be further extended to 1 1. Iris recognition using a real time video. ,. #uilt a complete product to ma e it as fully fledged software. 7. "he developed application should be able to support a large database. :. "he response time for the system supporting large database should be very less.
58
59