th
century China. Chinese merchants were known to stamp children’s inked palm and footprints on paper in order to tell them apart, (Julian 2004). In western culture, the earliest documented distinction made of a biometric property was that done by the English botanist Nehemiah Grew, who in 1684, published a paper reporting the distinct characteristics of ridge, furrow and pore structures in human fingerprints, (Ibid).In the intervening years the development of formal scientific method, lead to the first significant application of biometrics by Alphonse Bertillon, a 19th
century anthropologist and police clerk. The system, known as Bertillonage, purported to uniquely identify criminals via head and body measurement and other characteristics, such as scars or tattoos, (Ibid). Although flawed, Bertillonage helped to establish biometrics as a valid area of scientific enquiry and subsequent pioneers, such as Sir Francis Galton and Edward Henry further advanced the understanding of fingerprint morphology, (Davide et al 2003). Galton identified the “minutiae features” for fingerprint matching and the Henry system of fingerprint classification meant that by the early 20th
century fingerprint recognition had become a standard process in forensics for personal identification, (Ibid).Throughout the 20th
century, advancements in forensic science would eventually lead to the development of Automatic Fingerprint Identification Systems; (AFIS) which became indispensable to law-enforcement agencies worldwide. Today, along with the continued development of AFIS applications, the unprecedented growth of information technologies has seen the emergence of a range of other biometric systems with the potential for a broad based application in both government and commercial IT security.Taking attendance on a piece of paper is a cumbersome and boring task encountered by the lecturers in computer science and information technology department of Kebbi State University of Science and Technology Aliero due to the large number of population and uncertainty of data and nature of student’s hand writing. After an extensive interview with the acting H.O.D Malan Salisu Umar Suru (the project manager) and some other lecturers in the department on the existing way of taking attendance, I discovered the following problems with the method:
In any research scope and limitation is very essential, to determine the extend of the study, if the scope is too broad, the research will not be finished on time and if the scope is too narrow, it may not meet the user’s needs.
The proposal pay attention on development of students attendance authentication system, it intended to cover only how to enrols and authenticate users, store the fingerprint sample on the store. The system should comply with security standards for data transfer and maintenance and provide the appropriate mechanisms for handling the range of potential errors conditions that could arise as a result of system operation. The system should also maintain and protect the integrity of user data within the context of system failure and recovery. The application should provide acceptable performance standards in terms of response time and authentication reliability.
This project is limited to the development of student attendance authentication system using fingerprint to allow login of student at lectures.