ABSTACT
Examination
is a way of testing the ability of student on courses studied over a period of
time (semester/term). There are different types of examinations which could be
oral or written. Over the years, several works had been done on student being
admitted into examination hall which are still prone to error. Student ID card
and school fees printout are both previous methods used when identifying
registered student from non-registered students. However, biometric pin generation has not been done. This
system used Linear Congruential Generator and Minutiae algorithm to enhance
examiners work in identifying and verifying students for proper seat allocation
during examination with a view to reducing examination malpractice and
impersonation.
TABLE OF CONTENTS
Title
page i
Approval
page ii
Declaration iii
Dedication iv
Acknowledgement v
Abstract vi
Table of
Content vii
List of
Figure xi
CHAPTER ONE
1.0
Introduction 1
1.1 Background of Study 2
1.2 Problem Statement 4
1.3 Aim and Objective 5
1.4 Scope of the Study 5
1.5 Significant of the Study 5
CHAPTER TWO
2.0
Literature Review 6
2.1 Fingerprint 8
2.2 Fingerprint Verification 11
2.2.1 Common Used Verifications Traits 12
2.2.2 Signature Verification 12
2.2.3 Hand Verification 13
2.2.4 Retinal verification 13
2.2.5 Voice Verification 13
2.2.6 Facial Verification 14
2.7. Fingerprint Identification 14
2.3 Differences between Fingerprint
Verification 16
2.4 Functionalities of Biometrics 17
2.4.1 Capturing 19
2.4.2 Storage Templates 20
2.4.3 Comparing and Matching 21
2.5 Biometric and Privacy 22
2.5.1 Biometric Authentication 23
2.5.2 How Authentication Works 23
2.5.3 Security Vulnerabilities of Biometric System 25
2.5.5 Identification versus Verification 27
2.6 Generation of Reliable Personal
Identification Number (PINs) 27
2.7 Examination 29
2.8 Review of related Works 31
CHAPTER THREE
3.0 Methodology 34
3.1 Analysis of existing and Previous System 35
3.2 Problem of Existing System 35
3.3 System Design 37
3.3.1 Method of Data Collection 38
3.3.2 Block Diagram/ System Architecture 38
3.3.3 Description of the Proposed System 41
3.3.4 Program Flowchart 43
3.3.4.1 Uses Case Diagram 46
3.3.5 Algorithm 46
3.4 Justification of the New System 48
CHAPTER
FOUR
4.0 System Implementation and Documentation 49
4.1 System Implementation 49
4.2 System Documentation 49
4.3 System Installation 49
4.3.1 Hardware Requirement 49
4.3.2 Software Requirement 50
4.4 System Testing 51
4.5 System Changeover 53
4.6 Limitation of the 54
CHAPTER FIVE
5.0 Summary, Conclusion and Recommendation 56
5.0 Summary 56
5.1 Conclusion 57
5.2 Recommendation 57
5.3 Future Work
References
Appendix
LIST OF FIGURES
Figures
2.1(a) Adopted Arches 11
2.1(b) Adopted Loops 11
2.1(c) Adopted Whorls 12
2.2 Structure of a Biometric System 19
2.3 Privacy and Security issues in Biometric 24
3.1 Adopted Enrollment and Verification
system 35
3.2 Adopted Program Flowchart 40
3.3
User Flowchart 41
3.4 Use case Diagram 42
3.5 Adopted parameter of Minutiae 43
4.1 System Interface
47
4.2 Admin Login 47
4.3 Enrollment Phase 48
4.4 Verification and generation
of PIN 48
4.5 Enrollment Phase 49
4.6 Verification and generation
of PIN 49
4.7 Adopted parallel method 50
CHAPTER ONE
1.0 Introduction
Human
beings are numerous and so similar to one another; differentiating one from
another can be difficult (Altunkaya, 2008). Man, like living creatures, can be
identified by distinguishing characteristics. A child is customarily given a
name for identification purposes. Names are no longer the only means of identification
because many people are sharing the same name, especially in Northern Nigeria.
Mohammed, Mohammed for example, is a common name in Nigeria, where individuals
share the same identity in the same village (Jain, 2016).
Only
legitimate users of personal data or information should have access to that
data or information. The level of malpractice continue to increase on a regular
basis Access security has become extremely important especially in the
educational sector, where examinations are hosted and students are tested based
on the subject or course studied over a period of time (semester/term) (Nabti,
2008).
The
term biometrics is derived from two Greek words: bio means "life" and
metric means "to measure". It refers to the automatic identification
of individuals based on their physical or behavioral characteristics (Jungsoot,
2019).
A
user's physiological characteristics, such as face pattern, iris pattern,
fingerprint, palm print and hand geometry offer unique information that could
be used in authentication applications (Alice, 2013).
There
are two phases to the biometric system which are the enrollment phase and the verification
phase. During the enrollment phase, the feature vector is extracted from
individual objects and stored in a database. During the verification the user
provides a sample vector to the system, which is compared to the stored vector
and makes a decision based on a predetermined threshold value (Ramkumar, 2012).
The
manual approach, in which candidates are checked into the test hall and
assigned seats by the invigilator, is nevertheless prone to mistake (Prosant,
2016). Students are only admitted using the manual checking technique and are
not captured, validated, identified, or verified by any system, giving room for
impersonators by allowing them to enter the test/examination hall As a result,
most higher learning institutions across the world have prioritized steps to
ensure the smooth operation of examinations while avoiding participatory
misconduct (Jain, 2016).
A
Personal Identification Number (PIN) is a secret designed digit shared between users
and the system. Therefore, for a system access management to be operational,
the system captures student’s personal data through the registration phase as
well as fingerprint of the registered student. (Wiley, 2014).
Currently,
biometric technologies are being deployed to each physical and logical access
like personal organizations, public sectors, academic organizations etc
1.1 Background of Study
Biometrics
is the study of automated methods for uniquely recognizing humans upon one or
more characteristic or behavioral traits. Biometric authentication refers to
technologies that measure and analyzes human physical behavioral
characteristics for authentication purposes. Examples of physical
characteristics include fingerprints, eye retinas and irises, facial patterns
and hand measurements, while examples of behavioral characteristics include
signatures (Debnath, 2009)
An
examination is a quiz that is given to students to examine his/her basic
ability, skills or competence over course study in a given period (Bridget,
2013)
There
are many types of examinations, which might be oral or written. The oral
examination is a sort of exam in which learners are tested orally by the
examiner by asking questions. Seating arrangement usually brings about
nervousness (Bridget, 2013). This disturbs the examination procedure's
smoothness and possibly promote examination misconduct. Also, another approach
is that students individually select seats against the examination ethics.
The
integration of biometric and PIN based-technology will address the seating
arrangement and it altering issue by capturing, verifying, validating and
allocating seat number during examination using biometric fingerprint to
generate PIN in order to allow registered student of the Department of Computer
Science gain access as an authorization into the exam hall.
Fingerprint
Fingerprint
can be seen an impression left by the friction ridges of a human finger.
Fingerprints have intrinsic characteristics that make them suitable for use in
biometric systems.
The fingerprints
of a baby is formed between the first and second trimesters of pregnancy and
stay unaltered (barring any damage or scarring) until death. Fingerprints are one-of-a-kind
(Breiman, 2016)
Iris
Iris is
can be seen as a tin, annular structure in the eye, responsible for controlling
the diameter and size of the pupil (Wikipedia, 2015)
Thus,
the amount of light reaching the retina. The pupil is the eye aperture, while
the iris is the diaphragm. Retina scanning
includes scanning the distinctive pattern present in the retina region of the
eye using a low-intensity light. This is not always easy for those who wear
glasses, and some people find the thought of a light scanning their eye
invasive. (Daugman, 2015)
Voice recognition
Voice
verification is defined as a combination of physical and behavioral biometric
types that employs a microphone-recording device to obtain a sample of a user's
voiceprint. (Bashar, 2012)
Hand recognition
Hand
recognition is a biometric that identifies users from the shapes of their
hands. Hand recognition measures the users hand’s along many dimensions such as
height, width, deviation and angle compare those measurement to measure stored
in a database. (Wikipedia, 2015)
One of
the most well-known applications of biometrics nowadays is hand geometry. It's
precise and quick (Breiman, 2018).
1.2 Problem Statement
Identification
is a major task especially when conducting an examination for students where
impersonators find their way into examination hall. A Student may lose his/her
ID card and the school fees printout which will prevent him/her from entering
into the examination hall. Also, Students are fond of forming group reading and
seat the same way in the exam hall, thereby promoting examination malpractice.
The system tends to solve the above problems by designing and providing access
to generate random seat number for every student during examination.
1.3 Aim and Objective of Study
The aim
of the system is to implement biometric pin generation for seat allocation. The
objectives are:
i.
To perform biometric data capturing (fingerprint) and saving it into the
database
ii.
To verify, validate and generate pin for seat number allocation
iii.
To evaluate the proposed system using standard metrics.
1.4 Scope of Study
The scope of this project work covers only the PIN generation for
student seating arrangement for The Department of Computer Science, The Federal
Polytechnic Bida.
1.6 Significance of Study
The
increasing rate of examination malpractices in the educational sector is
alarming. The management of institutions conducting examination deserves to
inculcate a tight security means to ensure that the activities of examination
impersonators stop. This system uses the finger print biometric pin generated
to allocate seat to student, it will also serve as a means of collecting
student's attendance during examination.
It will
help to ensure that only registered student during registration with their
fingerprint captured are verified/ identified are allowed into the exam hall
1.7 Project Layout
This
entails the contents of each chapter of this project. The report contains five
chapters in which the summary of each chapter is as follows.
Chapter
one introduces the topic, states of the background of the study, the aim and
objectives, the scope and significance of the study.
Chapter
two contains the reviews the literature of related works.
Chapter
three contains the research methodology, analysis of existing system, problems
of existing system, system design, method of data collection, and
justification.
Chapter
four discusses the system implementation, system documentation, change over and
limitations.
Chapter
five summarizes, concludes and recommendation are made. Appendixes attached.
Login To Comment