BIOMETRIC PIN GENERATION FOR EXAMINATION SEAT ALLOCATION

  • 0 Review(s)

Product Category: Projects

Product Code: 00008939

No of Pages: 70

No of Chapters: 5

File Format: Microsoft Word

Price :

₦3000

  • $

ABSTACT

Examination is a way of testing the ability of student on courses studied over a period of time (semester/term). There are different types of examinations which could be oral or written. Over the years, several works had been done on student being admitted into examination hall which are still prone to error. Student ID card and school fees printout are both previous methods used when identifying registered student from non-registered students. However, biometric pin generation has not been done. This system used Linear Congruential Generator and Minutiae algorithm to enhance examiners work in identifying and verifying students for proper seat allocation during examination with a view to reducing examination malpractice and impersonation.

 

  

 

 

 

TABLE OF CONTENTS

Title page                                                                                                                                i

Approval page                                                                                                                        ii

Declaration                                                                                                                             iii

Dedication                                                                                                                              iv

Acknowledgement                                                                                                                  v

Abstract                                                                                                                                  vi

Table of Content                                                                                                                     vii

List of Figure                                                                                                                          xi

CHAPTER ONE

1.0           Introduction                                                                                                                1

1.1      Background of Study                                                                                                   2

1.2       Problem Statement                                                                                                     4

1.3       Aim and Objective                                                                                                     5

1.4       Scope of the Study                                                                                                      5

1.5       Significant of the Study                                                                                              5

CHAPTER TWO

2.0           Literature Review                                                                                                       6

2.1      Fingerprint                                                                                                                   8

2.2       Fingerprint Verification                                                                                            11

2.2.1    Common Used Verifications Traits                                                                            12

2.2.2    Signature Verification                                                                                                12

2.2.3    Hand Verification                                                                                                       13

2.2.4    Retinal verification                                                                                                     13

2.2.5    Voice Verification                                                                                                      13

2.2.6    Facial Verification                                                                                                      14

2.7.      Fingerprint Identification                                                                                           14

2.3       Differences between Fingerprint Verification                                                            16

2.4       Functionalities of Biometrics                                                                                     17

2.4.1    Capturing                                                                                                                    19

2.4.2    Storage Templates                                                                                                      20

2.4.3    Comparing and Matching                                                                                           21

2.5       Biometric and Privacy                                                                                                            22

2.5.1    Biometric Authentication                                                                                           23

2.5.2    How Authentication Works                                                                                        23

2.5.3    Security Vulnerabilities of Biometric System                                                            25

2.5.5    Identification versus Verification                                                                               27

2.6       Generation of Reliable Personal Identification Number (PINs)                                    27

2.7       Examination                                                                                                               29

2.8       Review of related Works                                                                                            31

CHAPTER THREE

3.0       Methodology                                                                                                              34

3.1       Analysis of existing and Previous System                                                                 35

3.2       Problem of Existing System                                                                                       35

3.3       System Design                                                                                                            37

3.3.1    Method of Data Collection                                                                                         38

3.3.2    Block Diagram/ System Architecture                                                                         38

3.3.3    Description of the Proposed System                                                                          41

3.3.4    Program Flowchart                                                                                                     43

3.3.4.1 Uses Case Diagram                                                                                                     46

3.3.5    Algorithm                                                                                                                   46

3.4       Justification of the New System                                                                                 48

 CHAPTER FOUR

4.0       System Implementation and Documentation                                                             49

4.1       System Implementation                                                                                              49

4.2       System Documentation                                                                                              49

4.3       System Installation                                                                                                     49

4.3.1    Hardware Requirement                                                                                               49

4.3.2    Software Requirement                                                                                                50

4.4       System Testing                                                                                                           51

4.5       System Changeover                                                                                                    53

4.6       Limitation of the                                                                                                         54

CHAPTER FIVE

5.0       Summary, Conclusion and Recommendation                                                            56

5.0       Summary                                                                                                                    56

5.1       Conclusion                                                                                                                  57

 5.2      Recommendation                                                                                                       57

5.3       Future Work                                                                                                              

References

Appendix

 



 

LIST OF FIGURES

Figures

2.1(a)   Adopted Arches                                                                                                          11

2.1(b)  Adopted Loops                                                                                                           11

2.1(c)   Adopted Whorls                                                                                                         12

2.2       Structure of a Biometric System                                                                                19

2.3       Privacy and Security issues in Biometric                                                                   24

3.1       Adopted Enrollment and Verification system                                                            35

3.2       Adopted Program Flowchart                                                                                      40

3.3       User Flowchart                                                                                                           41

3.4       Use case Diagram                                                                                                       42

3.5       Adopted parameter of Minutiae                                                                                 43

4.1       System Interface                                                                                                        47

4.2       Admin Login                                                                                                              47

4.3       Enrollment Phase                                                                                                        48

4.4       Verification and generation of PIN                                                                            48

4.5       Enrollment Phase                                                                                                        49

4.6       Verification and generation of PIN                                                                            49

4.7       Adopted parallel method                                                                                            50




 

CHAPTER ONE

1.0 Introduction

Human beings are numerous and so similar to one another; differentiating one from another can be difficult (Altunkaya, 2008). Man, like living creatures, can be identified by distinguishing characteristics. A child is customarily given a name for identification purposes. Names are no longer the only means of identification because many people are sharing the same name, especially in Northern Nigeria. Mohammed, Mohammed for example, is a common name in Nigeria, where individuals share the same identity in the same village (Jain, 2016).

Only legitimate users of personal data or information should have access to that data or information. The level of malpractice continue to increase on a regular basis Access security has become extremely important especially in the educational sector, where examinations are hosted and students are tested based on the subject or course studied over a period of time (semester/term) (Nabti, 2008).

The term biometrics is derived from two Greek words: bio means "life" and metric means "to measure". It refers to the automatic identification of individuals based on their physical or behavioral characteristics (Jungsoot, 2019).

A user's physiological characteristics, such as face pattern, iris pattern, fingerprint, palm print and hand geometry offer unique information that could be used in authentication applications (Alice, 2013).

There are two phases to the biometric system which are the enrollment phase and the verification phase. During the enrollment phase, the feature vector is extracted from individual objects and stored in a database. During the verification the user provides a sample vector to the system, which is compared to the stored vector and makes a decision based on a predetermined threshold value (Ramkumar, 2012).

The manual approach, in which candidates are checked into the test hall and assigned seats by the invigilator, is nevertheless prone to mistake (Prosant, 2016). Students are only admitted using the manual checking technique and are not captured, validated, identified, or verified by any system, giving room for impersonators by allowing them to enter the test/examination hall As a result, most higher learning institutions across the world have prioritized steps to ensure the smooth operation of examinations while avoiding participatory misconduct (Jain, 2016).

A Personal Identification Number (PIN) is a secret designed digit shared between users and the system. Therefore, for a system access management to be operational, the system captures student’s personal data through the registration phase as well as fingerprint of the registered student. (Wiley, 2014).

Currently, biometric technologies are being deployed to each physical and logical access like personal organizations, public sectors, academic organizations etc


1.1 Background of Study

Biometrics is the study of automated methods for uniquely recognizing humans upon one or more characteristic or behavioral traits. Biometric authentication refers to technologies that measure and analyzes human physical behavioral characteristics for authentication purposes. Examples of physical characteristics include fingerprints, eye retinas and irises, facial patterns and hand measurements, while examples of behavioral characteristics include signatures (Debnath, 2009)

An examination is a quiz that is given to students to examine his/her basic ability, skills or competence over course study in a given period (Bridget, 2013)

There are many types of examinations, which might be oral or written. The oral examination is a sort of exam in which learners are tested orally by the examiner by asking questions. Seating arrangement usually brings about nervousness (Bridget, 2013). This disturbs the examination procedure's smoothness and possibly promote examination misconduct. Also, another approach is that students individually select seats against the examination ethics.

The integration of biometric and PIN based-technology will address the seating arrangement and it altering issue by capturing, verifying, validating and allocating seat number during examination using biometric fingerprint to generate PIN in order to allow registered student of the Department of Computer Science gain access as an authorization into the exam hall.

Fingerprint

Fingerprint can be seen an impression left by the friction ridges of a human finger. Fingerprints have intrinsic characteristics that make them suitable for use in biometric systems.

The fingerprints of a baby is formed between the first and second trimesters of pregnancy and stay unaltered (barring any damage or scarring) until death. Fingerprints are one-of-a-kind (Breiman, 2016)

Iris

Iris is can be seen as a tin, annular structure in the eye, responsible for controlling the diameter and size of the pupil (Wikipedia, 2015)

Thus, the amount of light reaching the retina. The pupil is the eye aperture, while the iris is the diaphragm.  Retina scanning includes scanning the distinctive pattern present in the retina region of the eye using a low-intensity light. This is not always easy for those who wear glasses, and some people find the thought of a light scanning their eye invasive. (Daugman, 2015)

Voice recognition

Voice verification is defined as a combination of physical and behavioral biometric types that employs a microphone-recording device to obtain a sample of a user's voiceprint. (Bashar, 2012)

Hand recognition

Hand recognition is a biometric that identifies users from the shapes of their hands. Hand recognition measures the users hand’s along many dimensions such as height, width, deviation and angle compare those measurement to measure stored in a database. (Wikipedia, 2015)

One of the most well-known applications of biometrics nowadays is hand geometry. It's precise and quick (Breiman, 2018).


1.2 Problem Statement

Identification is a major task especially when conducting an examination for students where impersonators find their way into examination hall. A Student may lose his/her ID card and the school fees printout which will prevent him/her from entering into the examination hall. Also, Students are fond of forming group reading and seat the same way in the exam hall, thereby promoting examination malpractice. The system tends to solve the above problems by designing and providing access to generate random seat number for every student during examination.


1.3 Aim and Objective of Study

The aim of the system is to implement biometric pin generation for seat allocation. The objectives are:

i. To perform biometric data capturing (fingerprint) and saving it into the database

ii. To verify, validate and generate pin for seat number allocation

iii. To evaluate the proposed system using standard metrics.


1.4 Scope of Study

The scope of this project work covers only the PIN generation for student seating arrangement for The Department of Computer Science, The Federal Polytechnic Bida.


1.6 Significance of Study

The increasing rate of examination malpractices in the educational sector is alarming. The management of institutions conducting examination deserves to inculcate a tight security means to ensure that the activities of examination impersonators stop. This system uses the finger print biometric pin generated to allocate seat to student, it will also serve as a means of collecting student's attendance during examination.

It will help to ensure that only registered student during registration with their fingerprint captured are verified/ identified are allowed into the exam hall


1.7 Project Layout

This entails the contents of each chapter of this project. The report contains five chapters in which the summary of each chapter is as follows.

Chapter one introduces the topic, states of the background of the study, the aim and objectives, the scope and significance of the study. 

Chapter two contains the reviews the literature of related works.

Chapter three contains the research methodology, analysis of existing system, problems of existing system, system design, method of data collection, and justification.

Chapter four discusses the system implementation, system documentation, change over and limitations.

Chapter five summarizes, concludes and recommendation are made. Appendixes attached.


Click “DOWNLOAD NOW” below to get the complete Projects

FOR QUICK HELP CHAT WITH US NOW!

+(234) 0814 780 1594

Buyers has the right to create dispute within seven (7) days of purchase for 100% refund request when you experience issue with the file received. 

Dispute can only be created when you receive a corrupt file, a wrong file or irregularities in the table of contents and content of the file you received. 

ProjectShelve.com shall either provide the appropriate file within 48hrs or send refund excluding your bank transaction charges. Term and Conditions are applied.

Buyers are expected to confirm that the material you are paying for is available on our website ProjectShelve.com and you have selected the right material, you have also gone through the preliminary pages and it interests you before payment. DO NOT MAKE BANK PAYMENT IF YOUR TOPIC IS NOT ON THE WEBSITE.

In case of payment for a material not available on ProjectShelve.com, the management of ProjectShelve.com has the right to keep your money until you send a topic that is available on our website within 48 hours.

You cannot change topic after receiving material of the topic you ordered and paid for.

Ratings & Reviews

0.0

No Review Found.

Review


To Comment


Sold By

codeprojects

3

Total Item
Visit Store

Reviews (3)

  • Anonymous

    1 week ago

    I am thoroughly impressed with Projectshelve.com! The project material was of outstanding quality, well-researched, and highly detailed. What amazed me most was their instant delivery to both my email and WhatsApp, ensuring I got what I needed immediately. Highly reliable and professional—I'll definitely recommend them to anyone seeking quality project materials!

  • Anonymous

    2 weeks ago

    Its amazing transacting with Projectshelve. They are sincere, got material delivered within few minutes in my email and whatsApp.

  • TJ

    2 months ago

    ProjectShelve is highly reliable. Got the project delivered instantly after payment. Quality of the work.also excellent. Thank you