Design of a Web-Based Digital Library Management System with Biometric Authentication
DOI:
https://doi.org/10.70062/jeci.v1i2.223Keywords:
Authentication, Biometric System, Digital Librar, Fingerprint Recognition, Web-Based ApplicationAbstract
The rapid digitalization of academic resources has necessitated the development of more secure and efficient library management systems. Conventional password-based authentication methods are increasingly vulnerable to misuse, unauthorized access, and administrative inefficiencies. This study aims to design and implement a web-based digital library management system integrated with biometric fingerprint authentication to enhance security, usability, and management efficiency. The research employed a system development approach using web technologies such as PHP, MySQL, and biometric SDK integration. Evaluation was conducted by comparing the proposed system with traditional password-based models in terms of authentication accuracy, login speed, user satisfaction, and administrative efficiency. The findings revealed significant improvements: authentication accuracy increased from 89.5% to 98.7%, login time decreased from 7.8 to 2.9 seconds, and user satisfaction rose from 3.4 to 4.7 on the Likert scale. Additionally, unauthorized access attempts were completely eliminated, and administrative efficiency improved by 21.7%. These results demonstrate that biometric fingerprint authentication provides a highly reliable and user-friendly security mechanism, outperforming conventional authentication methods. The study concludes that integrating biometric technology into digital library systems not only strengthens data protection but also enhances operational performance and user experience. Future research should explore multi-modal biometrics, cloud-based scalability, and advanced encryption to further optimize system effectiveness.
References
Ansari, A. J., & Ali, P. M. N. (2021). Security challenges in central university libraries in India. Library Philosophy and Practice, 1–20.
Aphanasyev, I., Bukreev, A., Sitnikov, V., Streltsov, O., & Stupen, P. (2022). Biometric venous verification system for smartphone. In Proceedings of the International Conference on Communications, Information, Electronics and Energy Systems (CIEES). https://doi.org/10.1109/CIEES55704.2022.9990794
Arora, M. K. K., Hammouch, H., Singh, B., & Lal, S. (2025). Enhancing security intelligence through biometrics: Strengthening global institutions. In Forensic intelligence and deep learning solutions in crime investigation (pp. 85–102). https://doi.org/10.4018/979-8-3693-9405-2.ch005
Awoyemi, R. A., & Awoyemi, O. R. (2025). Smart inventory management systems for Nigerian academic libraries. Library Hi Tech News. https://doi.org/10.1108/LHTN-06-2025-0094
Chan, D. L. H., & Spodick, E. F. (2016). Transforming libraries from physical to virtual. In Digital information strategies: From applications and content to libraries and people (pp. 103–116). https://doi.org/10.1016/B978-0-08-100251-3.00007-X
Cunha, M. B. da. (2008). From conventional to digital libraries: Differences and convergences. Perspectivas em Ciência da Informação, 13(1), 2–17. https://doi.org/10.1590/s1413-99362008000100002
Dass, S. C. (2013). Fingerprint-based recognition. International Statistical Review, 81(2), 175–187. https://doi.org/10.1111/insr.12017
Dass, S. C., & Jain, A. K. (2007). Fingerprint-based recognition. Technometrics, 49(3), 262–276. https://doi.org/10.1198/004017007000000272
Ekere, J. N., Akor, P. U., & Akor, S. O. (2019). The use of ICT for security and theft prevention in two university libraries in Nigeria. Library Philosophy and Practice, Article 2366.
Fons, M., Fons, F., Cantó, E., & López, M. (2012). FPGA-based personal authentication using fingerprints. Journal of Signal Processing Systems, 66(2), 153–189. https://doi.org/10.1007/s11265-011-0629-3
Fu, J., Xiao, W., Lv, J., & Gao, G. (2012). Research on network security of digital library. Lecture Notes in Electrical Engineering, 113, 1119–1126. https://doi.org/10.1007/978-94-007-2169-2_132
Grigor, G. (2023). Biometric identification: Comparative analysis of current methods. Review of Economics and Finance, 21, 2279–2286. https://doi.org/10.55365/1923.x2023.21.244
Hota, P. K., Hota, L., & Dash, P. K. (2022). Blockchain in digital libraries: State of the art, trends, and challenges. In Machine learning adoption in blockchain-based intelligent manufacturing (pp. 17–32). https://doi.org/10.1201/9781003252009-2
Ismail, R., & Zainab, A. N. (2013). Assessing the status of library information systems security. Journal of Librarianship and Information Science, 45(3), 232–247. https://doi.org/10.1177/0961000613477676
Kabir, M. A. A., & Elmedany, W. (2022). An overview of the present and future of user authentication. In Proceedings of the 4th IEEE Middle East and North Africa Communications Conference (MENACOMM) (pp. 10–17). https://doi.org/10.1109/MENACOMM57252.2022.9998304
Kanta, A., Coisel, I., & Scanlon, M. (2024). A comprehensive evaluation on the benefits of context based password cracking for digital forensics. Journal of Information Security and Applications, 84, Article 103809. https://doi.org/10.1016/j.jisa.2024.103809
Kasemsap, K. (2016). Mastering digital libraries in the digital age. In E-discovery tools and applications in modern libraries (pp. 275–305). https://doi.org/10.4018/978-1-5225-0474-0.ch015
Kasemsap, K. (2017). Mastering digital libraries in the digital age. In Library science and administration: Concepts, methodologies, tools, and applications (Vols. 1–3, pp. 52–82). https://doi.org/10.4018/978-1-5225-3914-8.ch003
Khan, M. S. (2025). Online biometrics: Recent advances and new perspectives. In Modern intelligent techniques for image processing (pp. 269–283). https://doi.org/10.4018/979-8-3693-9045-0.ch011
Larson, P. D., & Williams, S. F. (2010). Web technology – Centralized and collaborative estimating. AACE International Transactions, 1, 442–453.
Lee, Y.-C. (2012). A secure password-based authentication scheme against guessing attack. Lecture Notes in Electrical Engineering, 165, 1255–1260. https://doi.org/10.1007/978-1-4419-8849-2_161
Li, Y. (2024). Multi-layered security technology for campus library systems based on internet technology. In Proceedings of the 5th International Conference on Information Science and Education (ICISE-IE 2024) (pp. 137–146). https://doi.org/10.1109/ICISE-IE64355.2024.11025405
Macmillan, D. (2004). Web-based worksheets in the classroom. Journal of Library and Information Services in Distance Learning, 1(2), 43–51. https://doi.org/10.1300/J192v01n02_05
Nath, R. (2021). Electronic security systems (ESSs) in academic libraries. Library Philosophy and Practice, 1–18.
Okubanjo, A., Okandeji, A., Osifeko, O., Onasote, A., & Olayemi, M. (2022). Development of a hybrid radio frequency identification (RFID) and biometric based library management system. Gazi University Journal of Science, 35(2), 567–584. https://doi.org/10.35378/gujs.834087
Pan, H.-T., Wu, C.-C., Yang, C.-Y., & Hwang, M.-S. (2018). The weaknesses of the virtual password authentication protocol with cookie. IOP Conference Series: Materials Science and Engineering, 466(1), Article 012009. https://doi.org/10.1088/1757-899X/466/1/012009
Papaspirou, V., Maglaras, L., Ferrag, M. A., Kantzavelou, I., Janicke, H., & Douligeris, C. (2021). A novel two-factor honeytoken authentication mechanism. In Proceedings of the International Conference on Computer Communication and Networks (ICCCN). https://doi.org/10.1109/ICCCN52240.2021.9522319
Ravi, T., Vasanthakumar, M., Manjunatha, P. S., & Khyamaling, R. (2024). Use of the Internet of Things as increase in the productivity of a library system. In Proceedings of the Asian Conference on Intelligent Technology (ACOIT). https://doi.org/10.1109/ACOIT62457.2024.10939275
Saravanan, V., & Sindhuja, R. (2013). Iris authentication through Gabor filter using DSP processor. In Proceedings of the IEEE Conference on Information and Communication Technologies (ICT 2013) (pp. 568–571). https://doi.org/10.1109/CICT.2013.6558159
Sharma, M. K., & Kumar, R. (2011). WEBtop (operating systems on web). AIP Conference Proceedings, 1414, 154–158. https://doi.org/10.1063/1.3669948
Subitha, D., Rahul, S. G., & Uddin, P. Md. (2024). Artificial intelligence in biometric systems. In AI based advancements in biometrics and its applications (pp. 47–67). https://doi.org/10.1201/9781032702377-3
Tebbetts, D. R. (2021). Building the digital library infrastructure: A primer. In Information technology planning (pp. 5–23). https://doi.org/10.4324/9781315862347-2
Tedd, L. A., & Large, A. (2005). Digital libraries: Principles and practice in a global environment. https://doi.org/10.1515/9783598440052
Trabelsi, S., & Missaoui, C. (2018). Dissuading stolen password reuse. Lecture Notes in Computer Science, 11263, 116–128. https://doi.org/10.1007/978-3-030-04372-8_10
Yu, Y., et al. (2023). A review of fingerprint sensors: Mechanism, characteristics, and applications. Micromachines, 14(6), Article 1253. https://doi.org/10.3390/mi14061253


