ABSTRACT
This preliminary document covers the arrangement phase of a final year BSc (Hons)
computer science project aiming to develop a fingerprint recognition application to
allow logging of student attendance at lectures. The introduction offers some
background to the project and establishes the aims and objectives of the project
overall. Following on from the introduction, the literature review presents an account
of research material that provides the basis for the project. This material includes a
number of texts, journals and research papers as well as additional information
sourced from the Web. As drawn from the literature, the subject areas covered
include; history and background to modern biometrics; technological, social,
organizational and environmental influences; key technologies in the market today;
design issues, including security, performance and testing.
In chapter 3, attention turns to requirements analysis for the development of a
fingerprint recognition system. The process follows a requirements engineering
approach to development by formally establishing user requirements and allowing
continuous requirements assessment throughout the project life-cycle. The design
approach and methodology used to model the problem are also addressed in chapter
4, in this chapter (4) we also deals with high level design issues such as requirements
engineering in the solution domain; assessment and selection of technology options;
project management, implementation strategy and evaluation of user requirements.
TABLE OF CONTENTS
DECLARATION - - - - - - - - - - . i
CERTIFICATION - - - - - - - - ii
DEDICATION - - - - - - - - - . iii
ACKNOWLEDGEMENT - - - - - - - - - . iv
ABSTRACT - - - - - - - . vi
TABLE OF CONTENTS - - - - - - - - vii
CHAPTER ONE - - - - - - - - - - . 1
1.0 Introduction - - - - - - - - 1
1.1 Statement of the problems - - - - - - - - . 2
1.2 Aim and objectives - - - - - - - 2
1.3 Scope and limitation of the study - - - - - - - . 3
CHAPTER TWO - - - - - - - - - - 4
LITERATURE REVIEW - - - - - - - - . 4
2.0 Introduction - - - - - - - - 4
2.1 Historical background of the study area - - - - - - . 5
2.2 The concept of modern biometric system - - - - - - - 5
2.3 Evolution of modern biometrics - - - - - - . 7
2.4 Technical development - - - - - - . 10
2.4.0 Classification of biometric - - - - - - - - 10
2.4.1 Wayman classifications of biometric - - - - - . 12
2.4.2 Key technologies of biometric - - - - - - . 14
2.5 Industry standards - - - - - - - - 22
2.6 Biometric concerns - - - - - - - - - . 23
2.6.0 Informational privacy concerns - - - - - - - . 24
2.6.1 Physical privacy concern - - - - - - - 25
2.6.2 Religious concerns - - - - - - . 25
2.7 Performance of biometric - - - - - - - - . 25
CHAPTER THREE - - - - - - - 28
METHODOLOGY AND SYSTEM ANALYSIS - - - - - - 28
3.0 Introduction - - - - - - - - - 28
3.1 Research methodology - - - - - - . 28
3.2 Modelling and requirements engineering - - - - - 31
3.2.0 Mapping GRAPPLE and Requirements Engineering - - - - . 32
3.2.1 Requirements Management using DOORS - - - - - - 35
3.2.2 Defining the Problem Domain - - - - - - . 35
3.3 Requirements engineering in the problem domain - - - - . 36
3.3.0 Fingerprint Authentication: Statement of Needs - - - - - 36
3.4 Requirements gathering in the problem domain - - - - - . 37
3.4.0 Develop Stakeholder Requirements - - - - - - - 37
3.4 Analysis of System Requirements - - - - - . 38
3.4.0 System functional Requirements - - - - - - - - . 38
3.4.1 Non-Functional Requirements - - - - - - . 39
CHAPTER FOUR - - - - - - - - - . 40
SYSTEM DESIGN, IMPLEMENTATION AND TESTING - - - 40
4.0 Introduction - - - - - - - - - 40
4.1 System design - - - - - - - - . 40
4.2 System requirements - - - - - - - 42
4.2.0 Hardware Requirement - - - - - - - . 42
4.2.1 Software Requirement - - - - - - - - - . 42
4.3 User interface design - - - - - - - 42
4.4 Database design - - - - - - - - - 43
4.5 System operational procedure - - - - - - . 44
4.6 System implementation - - - - - - 48
4.7 Software testing and validation - - - - - - 48
4.8 System testing - - - - - - - - . 49
CHAPTER FIVE - - - - - - - - 50
SUMMARY CONCLUSION AND RECOMMENDATION - - - 50
5.0 Summary - - - - - - - - - - . 50
5.1 Conclusion - - - - - - - - . 50
5.2 Recommendation - - - - - - - - - - 51
REFERENCES - - - - - - - - - - . 52
Appendix A - - - - - - - . 57
Operational screenshots - - - - - - - . 57