Design of a Web-Based Digital Library Management System with Biometric Authentication

Authors

  • Anjis Sapto Nugroho Sekolah Tinggi Manajemen Informatika dan Komputer AKI Pati Author
  • Eko Prasetyo Sekolah Tinggi Manajemen Informatika dan Komputer AKI Pati Author
  • Daniel Alfa Puryono Sekolah Tinggi Manajemen Informatika dan Komputer AKI Pati Author
  • Eram Abbasi IQRA University Author

DOI:

https://doi.org/10.70062/jeci.v1i2.223

Keywords:

Authentication, Biometric System, Digital Librar, Fingerprint Recognition, Web-Based Application

Abstract

The rapid digitalization of academic resources has necessitated the development of more secure and efficient library management systems. Conventional password-based authentication methods are increasingly vulnerable to misuse, unauthorized access, and administrative inefficiencies. This study aims to design and implement a web-based digital library management system integrated with biometric fingerprint authentication to enhance security, usability, and management efficiency. The research employed a system development approach using web technologies such as PHP, MySQL, and biometric SDK integration. Evaluation was conducted by comparing the proposed system with traditional password-based models in terms of authentication accuracy, login speed, user satisfaction, and administrative efficiency. The findings revealed significant improvements: authentication accuracy increased from 89.5% to 98.7%, login time decreased from 7.8 to 2.9 seconds, and user satisfaction rose from 3.4 to 4.7 on the Likert scale. Additionally, unauthorized access attempts were completely eliminated, and administrative efficiency improved by 21.7%. These results demonstrate that biometric fingerprint authentication provides a highly reliable and user-friendly security mechanism, outperforming conventional authentication methods. The study concludes that integrating biometric technology into digital library systems not only strengthens data protection but also enhances operational performance and user experience. Future research should explore multi-modal biometrics, cloud-based scalability, and advanced encryption to further optimize system effectiveness.

References

Ansari, A. J., & Ali, P. M. N. (2021). Security challenges in central university libraries in India. Library Philosophy and Practice, 1–20.

Aphanasyev, I., Bukreev, A., Sitnikov, V., Streltsov, O., & Stupen, P. (2022). Biometric venous verification system for smartphone. In Proceedings of the International Conference on Communications, Information, Electronics and Energy Systems (CIEES). https://doi.org/10.1109/CIEES55704.2022.9990794

Arora, M. K. K., Hammouch, H., Singh, B., & Lal, S. (2025). Enhancing security intelligence through biometrics: Strengthening global institutions. In Forensic intelligence and deep learning solutions in crime investigation (pp. 85–102). https://doi.org/10.4018/979-8-3693-9405-2.ch005

Awoyemi, R. A., & Awoyemi, O. R. (2025). Smart inventory management systems for Nigerian academic libraries. Library Hi Tech News. https://doi.org/10.1108/LHTN-06-2025-0094

Chan, D. L. H., & Spodick, E. F. (2016). Transforming libraries from physical to virtual. In Digital information strategies: From applications and content to libraries and people (pp. 103–116). https://doi.org/10.1016/B978-0-08-100251-3.00007-X

Cunha, M. B. da. (2008). From conventional to digital libraries: Differences and convergences. Perspectivas em Ciência da Informação, 13(1), 2–17. https://doi.org/10.1590/s1413-99362008000100002

Dass, S. C. (2013). Fingerprint-based recognition. International Statistical Review, 81(2), 175–187. https://doi.org/10.1111/insr.12017

Dass, S. C., & Jain, A. K. (2007). Fingerprint-based recognition. Technometrics, 49(3), 262–276. https://doi.org/10.1198/004017007000000272

Ekere, J. N., Akor, P. U., & Akor, S. O. (2019). The use of ICT for security and theft prevention in two university libraries in Nigeria. Library Philosophy and Practice, Article 2366.

Fons, M., Fons, F., Cantó, E., & López, M. (2012). FPGA-based personal authentication using fingerprints. Journal of Signal Processing Systems, 66(2), 153–189. https://doi.org/10.1007/s11265-011-0629-3

Fu, J., Xiao, W., Lv, J., & Gao, G. (2012). Research on network security of digital library. Lecture Notes in Electrical Engineering, 113, 1119–1126. https://doi.org/10.1007/978-94-007-2169-2_132

Grigor, G. (2023). Biometric identification: Comparative analysis of current methods. Review of Economics and Finance, 21, 2279–2286. https://doi.org/10.55365/1923.x2023.21.244

Hota, P. K., Hota, L., & Dash, P. K. (2022). Blockchain in digital libraries: State of the art, trends, and challenges. In Machine learning adoption in blockchain-based intelligent manufacturing (pp. 17–32). https://doi.org/10.1201/9781003252009-2

Ismail, R., & Zainab, A. N. (2013). Assessing the status of library information systems security. Journal of Librarianship and Information Science, 45(3), 232–247. https://doi.org/10.1177/0961000613477676

Kabir, M. A. A., & Elmedany, W. (2022). An overview of the present and future of user authentication. In Proceedings of the 4th IEEE Middle East and North Africa Communications Conference (MENACOMM) (pp. 10–17). https://doi.org/10.1109/MENACOMM57252.2022.9998304

Kanta, A., Coisel, I., & Scanlon, M. (2024). A comprehensive evaluation on the benefits of context based password cracking for digital forensics. Journal of Information Security and Applications, 84, Article 103809. https://doi.org/10.1016/j.jisa.2024.103809

Kasemsap, K. (2016). Mastering digital libraries in the digital age. In E-discovery tools and applications in modern libraries (pp. 275–305). https://doi.org/10.4018/978-1-5225-0474-0.ch015

Kasemsap, K. (2017). Mastering digital libraries in the digital age. In Library science and administration: Concepts, methodologies, tools, and applications (Vols. 1–3, pp. 52–82). https://doi.org/10.4018/978-1-5225-3914-8.ch003

Khan, M. S. (2025). Online biometrics: Recent advances and new perspectives. In Modern intelligent techniques for image processing (pp. 269–283). https://doi.org/10.4018/979-8-3693-9045-0.ch011

Larson, P. D., & Williams, S. F. (2010). Web technology – Centralized and collaborative estimating. AACE International Transactions, 1, 442–453.

Lee, Y.-C. (2012). A secure password-based authentication scheme against guessing attack. Lecture Notes in Electrical Engineering, 165, 1255–1260. https://doi.org/10.1007/978-1-4419-8849-2_161

Li, Y. (2024). Multi-layered security technology for campus library systems based on internet technology. In Proceedings of the 5th International Conference on Information Science and Education (ICISE-IE 2024) (pp. 137–146). https://doi.org/10.1109/ICISE-IE64355.2024.11025405

Macmillan, D. (2004). Web-based worksheets in the classroom. Journal of Library and Information Services in Distance Learning, 1(2), 43–51. https://doi.org/10.1300/J192v01n02_05

Nath, R. (2021). Electronic security systems (ESSs) in academic libraries. Library Philosophy and Practice, 1–18.

Okubanjo, A., Okandeji, A., Osifeko, O., Onasote, A., & Olayemi, M. (2022). Development of a hybrid radio frequency identification (RFID) and biometric based library management system. Gazi University Journal of Science, 35(2), 567–584. https://doi.org/10.35378/gujs.834087

Pan, H.-T., Wu, C.-C., Yang, C.-Y., & Hwang, M.-S. (2018). The weaknesses of the virtual password authentication protocol with cookie. IOP Conference Series: Materials Science and Engineering, 466(1), Article 012009. https://doi.org/10.1088/1757-899X/466/1/012009

Papaspirou, V., Maglaras, L., Ferrag, M. A., Kantzavelou, I., Janicke, H., & Douligeris, C. (2021). A novel two-factor honeytoken authentication mechanism. In Proceedings of the International Conference on Computer Communication and Networks (ICCCN). https://doi.org/10.1109/ICCCN52240.2021.9522319

Ravi, T., Vasanthakumar, M., Manjunatha, P. S., & Khyamaling, R. (2024). Use of the Internet of Things as increase in the productivity of a library system. In Proceedings of the Asian Conference on Intelligent Technology (ACOIT). https://doi.org/10.1109/ACOIT62457.2024.10939275

Saravanan, V., & Sindhuja, R. (2013). Iris authentication through Gabor filter using DSP processor. In Proceedings of the IEEE Conference on Information and Communication Technologies (ICT 2013) (pp. 568–571). https://doi.org/10.1109/CICT.2013.6558159

Sharma, M. K., & Kumar, R. (2011). WEBtop (operating systems on web). AIP Conference Proceedings, 1414, 154–158. https://doi.org/10.1063/1.3669948

Subitha, D., Rahul, S. G., & Uddin, P. Md. (2024). Artificial intelligence in biometric systems. In AI based advancements in biometrics and its applications (pp. 47–67). https://doi.org/10.1201/9781032702377-3

Tebbetts, D. R. (2021). Building the digital library infrastructure: A primer. In Information technology planning (pp. 5–23). https://doi.org/10.4324/9781315862347-2

Tedd, L. A., & Large, A. (2005). Digital libraries: Principles and practice in a global environment. https://doi.org/10.1515/9783598440052

Trabelsi, S., & Missaoui, C. (2018). Dissuading stolen password reuse. Lecture Notes in Computer Science, 11263, 116–128. https://doi.org/10.1007/978-3-030-04372-8_10

Yu, Y., et al. (2023). A review of fingerprint sensors: Mechanism, characteristics, and applications. Micromachines, 14(6), Article 1253. https://doi.org/10.3390/mi14061253

Downloads

Published

2025-07-31