QR Code Based Examination Card Verificat
QR Code Based Examination Card Verificat
SYSTEM
(A CASE STUDY OF KSUSTA)
MAY, 2021.
ii
DECLRATION
Sign--------------------------------------- -----------------------------
MUSTAPHA ABUBAKAR NASIR DATE
iii
CERTIFICATION
This Project is written under the direction and supervision of the candidate„s
Project supervisor and approved. This is to satisfy that the student has presented it
orally to the Department of Information and Communication Technology, kebbi
State University Of Science And Technology, Aliero, in partial fulfillment for the
award of Bachelor of Technology (B.Tech) Degree in Information and
Communication Technology.
Sign…………………………… ………………………………
Mr. Yazid Haruna Shayau Date
(Project Supervisor)
Sign…………………………… ………………………………
Assoc. Dr. Aliyu Rufai yauri Date
(Head of Department)
Sign…………………………… ………………………………
Prof. Saleh Abdullahi Date
(External Examiner)
Sign…………………………… ………………………………
Mr. Yunusa Adamu Bena Date
(Project coordinator)
iv
DEDICATION
I dedicate this project report to Almighty God whose love and grace towards my
Academic pursuit is endless and to my parents for their love and contribution.
v
ACKNOWLEDGEMENT
Profound gratitude goes to the project supervisor Mr. Haruna Yazid Shayau and
also to the Mr. Idris Labaran Jega for making this project a learning process,
others in the trend are departmental lecturers and a lots of friends in the faculty of
Engineering. Special gratitude goes out to (Soft Tech ISSL, Abuja) that helped me
with all kind of coding throughout my SIWES program. Also to acknowledge my
parents and my siblings for their great support during academic pursuit; may the
Almighty God bless them for me. My great thanks go to God Almighty who has
made this project a success.
vi
ABSTRACT
TABLE OF CONTENTS
DECLARATION ii
CERTIFICATION iii
DEDICATION iv
ACKNOWLEDGEMENT v
ABSTRACT vi
TABLE OF CONTENTS vii
LIST OF TABLES x
LIST OF FIGURES xii
LIST OF APPENDICES xiii
1 INTRODUCTION 1
1.1 Introduction 1
1.2 Theoretical Background of QR-code 2
1.2.1 How Qr-codes works 3
1.2.1 Features of Qr-codes 4
1.3 Problem Statement 5
1.4 Project Aim 5
1.5 Project Objective 6
1.6 Project Scope 6
1.7 Project Significance 7
1.8 Operational Definition of terms 7
2 LITERATURE REVIEW 9
2.1 Introduction 9
2.2 QR-code 9
2.3 Related Works 10
3 METHODOLOGY 12
viii
LIST OF TABLES
LIST OF FIGURES
LIST OF APPENDICES
A Database connection 37
B Admin Modules 37
CHAPTER 1
INTRODUCTION
1.1 Introduction
Therefore, there is a need for a mobile and accessible exams card authentication
system as solution to both physical security and certain administrative duties that
demand examination card authentication and verification.
affordable, it is assumed that the potential users of the proposed system presented in
This research would have been used to the operation of smart phone. Thus, the
proposed system will be accessible to these intending users at no additional cost and
less training.
Quick Response codes or in brief QR-codes, are two dimensional (2D) matrix
barcodes that are scanned using web capable smart mobile phones having camera,
with QR Reader put in as default application, allows one to access some pre-written
content such as a web site address, email address, details of things within the
catalogue, phone numbers etc (Hui et al., 2014; Shettar, 2020).
(Bajpai & Agrawal, 2013; Shettar, 2020; Ump, n.d.)Data may be encoded
into a QR-code by QR-code generator (Some of QR-code Generators available
online are listed in later part). Information may be easily encoded in to QR-codes by
using any freely available QR-code generators, enter the data to be encoded in to the
sphere provided by generators. QR-code generators may ask you to enter data to
several Data Fields available, depending on what data you're encoding. Once all the
data fields are filled out with necessary data in correct format, QR-code generator
can publish the QR-code for the information, which is in a position to be within the
main image format (JPEG, BMP, and PNG etc.). This could be used directly on
internet or mails in e-format or may be revealed in Print format. It‟s additionally
attainable to disarrange the color and even attainable to feature image in to QR-codes
to provide creative embellishment.
phone that has QR-code Reader software package program pre-installed, If not the
software may be downloaded from varied sites that are freely available on internet
(Some of QR-code readers offered on-line are listed in later part). QR-codes could
also be decoded with on-line decoder like ZXing Decoder on-line, MiniQR, on-line
Barcode Reader, Patrick WiedQR Generator, QR-code Generator and Recovery. QR-
codes also can be decoded with good Phone‟s Camera by directing it towards theQR-
code and scanning with image capture. Then pre-installed QR-code reader decodes
the QR-code and displays content as text or uniform resource locator format. QR-
codes additionally prompt your mobile devices navigate to an internet page actions
like dial variety, send SMS, Save Reminders, save variety to Phone Book etc. Most
common QR-code functions are given below:
that will manage the courses registrations and examination card management system
for easy verification and authentications.
Due to time constraints, I couldn‟t link the system to remote server (school
Data base), so I create a simple database to store students and courses information
using Microsoft Access.
7
CHAPTER 2
LITERATURE REVIEW
2.1 Introduction
2.2 QR-code
Similarly, Singhal and Pavithr in their work applied the utilization of QR-
code and Smart phone to degree certificate verification and authentication. The
verification process scans the QR-code embedded on the certificate (M1) and
decrypts the signature from the university's public key in order to generate the hash
value (M2) (Singhal, 2015) If the hashed value generated from M1, matched that of
M2, then the certificate under authentication test is passed or otherwise. This work
does not look in the direction of an offline system that will save the technicality
demands and cost requirements of an online system.
Review of the earlier stated systems show that they are all online systems.
That is, their operation is solely dependent to the availability of a network
connection. Availability of a reliable network connection and thus the implication is
often a huge deal in some developing countries. This network dependence motivated
this proposed work for an offline system.
12
CHAPTER 3
METHODOLOGY
An iterative life cycle model doesn't plan to start with a full specification of
requirements. Instead, development begins by specifying and implementing just a
part of the software, which may then be reviewed so as to spot further requirements.
This process is then repeated, producing a replacement version of the software for
every cycle of the model (SDLC Iterartive model, 2021).
13
Consider an iterative life cycle model, which consists of repeating the following
four, phases in sequence:
REQUIREMENT DESIGN
REVIEW IMPLEMEN
TATION & TEST
The software solution is prepared in the Design process to satisfy the design
requirements. The device design could be brand new or a continuation of a previous
build.
The framework is built during the implementation and test phases by coding
and designing the user interface and modules, which are then implemented and
checked.
i. Produces working system rapidly and before time throughout the software
development life cycle.
ii. Provides more and more flexible and enhance based on requirements.
iii. Simple to test as well as repair as small iteration.
15
The current system does not make use of the QR-code concepts. In the
current examination card system, students will register their courses which they will
sit for during the examination and after the registration, an e-photo card is brought to
the exam hall, but this is still not a strong measure of security because the card will
be observed/inspected to check the passport photograph and compare to the holder.
Any student who is not capable of writing the exam due to laziness or
corruption/malpractice in studies might pay someone else to write the exam for
him/her. The person involved is the impersonator.
In the university system, not all students are known by the lecturers. Student
simply arrives at the exam hall for the exam and enters with his exams card without
been check properly if he/she is a student of the department/faculty.
The proposed system will identify the student by scanning the QR-code
placed on the student‟s examination card. Each black and white box on the code,
when scan is translated to digital information; which will allow the computer to
access the database and provide the student academic record. This new system would
ensure that there is a unique way of identifying an individual as KSUSTA student
and the system would have high integrity, confidentiality, be accessible and non-
repudiating. It would be such that when a student‟s Exam card is scanned and
his/her identity is obtained, it should be possible to ascertain that they are who they
say they are and this can be repeated everywhere around the country with the same
result. The system would be the pure automated solution and it will help to generate
student Identification/exams card easily. It is a special type of software, which will
be used to make an advance examination card using QR-code instead of the barcode.
The QR-code would be attached to each student‟s examinations card and the
information that would be embedded in the QR-code will contain unique data of the
student such as matriculation number, department, faculty, Level, course registered
and all other important information about the student.
17
The designed system is a fully automated system, reliable, fast, accurate and
eliminates paper work. It saves time, cost-effective, difficult to replicate or simulate
and difficult to alter. This proposed system will eliminate any possibilities of identity
theft and examinations card forgery.
3.5.1.1 Interview
questions to respondents was to aid the researcher get a leverage ground of the
technical knowhow of the impact of the use of the system especially in KSUSTA
which is chosen as the case study for this research. All this aimed towards arriving at
a good conclusion.
The secondary source of data used for this research is the use of libraries
which comprises of textbooks, past project works, the internet, and other related
works. This method of data collection is to broaden the scope of the researcher and to
look into several peoples work and what has been done so far in order to give his/her
own quota to the topic under review.
Use case diagrams describe what a system does from the standpoint of an
external observer. The emphasis of use case diagrams is on what a system does rather
than how. They are used to show the interactions between users of the system and the
system. A use case represents the several users called actors and the different ways in
which they interact with the system.
19
3.6.1 Actors
i. Students
ii. Admin
i. Register
ii. Login
iii. Change password
iv. Register courses
v. Print examination card
vi. Add/remove course/department
vii. Compute result
viii. View all student details
ix. Create a user account
x. Log out.
20
Below is the diagram of the use case for the proposed system.
Register
Log In
Change Password
Course Reg.
Admin Student
View Student Data
Add/delete Course/Depts.
Add Admin
The input requirements include: users ID, students‟ details, course details,
faculty, department, levels, reports, course unit etc.
The hardware is the physical and tangible components of a system unit, which
will function together to perform the required task. These components are:
i. Central processing unit (CPU)
ii. Keyboard
iii. Minimum of 2GB RAM
iv. 256 GB of hard disc
v. Monitor (VDU-visual display unit)
vi. Printer
vii. Smartphone or QR-code scanner
22
viii. Mouse
The software is the non-physical part of the system that uses the hardware
components to successfully run the system that has been built. These components
are:
i. Windows operating system
ii. Microsoft visual studio 2012 and above
iii. Web browser
iv. MS Access 2007
v. Visual Basic
i. tblStudentReg
ii. tblAdminAddCourse
iii. tblRegCourse
iv. tblDepartments.
23
Email Text 20
Password Text 20
The technologies/tools that will be used for this work are as follows:
3.10.1 Phishing
QR codes with malicious URLs are often used to guide visitors to a bogus
website that needs login information. When users attempt to log in via the false login
tab, they unwittingly supply the intruder with their login credentials
3.10.2 Fraud
Users would be enticed to try QR codes as they become more popular. Let's
take a look at some warning signs and security tips that we should be aware of in
order to use QR codes safely.
i. QR codes are commonly placed on posters used for famous ads such
as movies and competitions. An attacker can easily print and overlay
his own malicious QR codes on top of the legitimate QR codes.
ii. Install a mobile security application with antivirus, antispyware and
web filtering abilities to protect your mobile devices.
iii. Until launching the associated software on your mobile devices, use a
QR code scanner that shows the content of the QR code. If the content
is a URL, the scanner can show you the URL, website info, a safety
rating for the URL, and the option to be redirected to the site by
clicking on it. This allows you to search for questionable URLs and
therefore prevents you from visiting a malicious website.
iv. If a QR code asks for personal information, don't give it out until
you're sure it's genuine. Use a browser search to find the website and
don't click on any other links or provide any details.
27
CHAPTER 4
4.1 Introduction
Design and implementation refer to the real live running of the designed
program. This section consists of program modules, showing what they represent,
and how the system can be used and deployed.
Below are the system modules and how they operate, it will give the users
better understanding of how the system works.
This is the first page that opens to a user as the user opens the system. The
page gives the highlight of the website. It answers the anticipation of the user as to
what is contained in the website. It further gives the user the opportunity to browse
and navigate through the site. Below is the screenshot of the home page.
28
The user‟s login page is the page where users of the system can login and
have access to their dashboard. The login page has two-user login, the student login
and the admin login, the admin login is where the admin can have access to his own
dashboard (page), the students will login with their matric. number to gain access to
the application page. Below is the user's and the admin login page.
This page is where a student is taken to after login in with his matric. number,
on this page there are menu links where students can carry out some operations, such
as course registration, print the examination card and can change his password.
Below is the student‟s panel.
On clicking the register course from the student panel, this is the page that is
displayed to the students, if the students matric. number is valid, some details about
the students is also displayed, the student will then go ahead and register for a course.
Below is the application module.
30
Students can view and prints their exams card from this page, below is the
students print exams card page.
This is the page that is displayed to the admin after login with his log-in ID
and password to carry out some operations. The page welcomes the admin if the
userid and password are valid. The page has menu links where the admin can
navigate to carry out the operations. The admin dashboard is shown below.
4.3 Results
Below shows the QR code scanned using a mobile phone and also display the
results of the scanned QR code.
32
CHAPTER 5
5.1 Summary
This research project was able to build a QR-code based examination card
verification system for Kebbi State University of Science And Technology to
manage the processes involved in examination card issuing system and management.
Having a robust database, it stores every information as related to courses and
students. It also allows updating of such information, as it is one of the activities of
file processing and the characteristics of a database.
The QR code-based examination card verification system has been tested and
found to achieve the following:
i. Courses registrations by the students.
ii. printing of examinations card
34
This software can be used by any institution that uses the same examination
card management system and course registrations policy with Kebbi State
University of Science and Technology, which is applicable to all institutions of
higher learning in Nigeria.
5.4 Conclusions
5.5 Recommendation
REFERENCES
APPENDIX
APPENDICES A:
connections
Imports System.Data.OleDb
Module Module1
Sub ConnectToDB()
Try
With cn
.ConnectionString = "Provider=Microsoft.ACE.OLEDB.12.0;Data
Source=|DataDirectory|\CourseReg_DB.accdb"
End With
Catch ex As Exception
cn.Close()
End Try
End Sub
End Module
APPENDICES B:
Admin Module
Imports System.Data.OleDb
Imports System.IO
Public Class frmAdmin
End If
If Len(Trim(cboQuestion.Text)) = 0 Or cboQuestion.Text = "N/A" Then
MsgBox("Select a security question?", vbCritical)
cboQuestion.Focus()
Return
End If
If Len(Trim(txtAnswer.Text)) = 0 Then
MsgBox("Enter your security answer?", vbCritical)
txtAnswer.Focus()
Return
End If
If Len(Trim(cboStatus.Text)) = 0 Then
MsgBox("Select status?", vbCritical)
cboStatus.Focus()
Return
End If
If Len(Trim(cboUserType.Text)) = 0 Then
MsgBox("Select usertype?", vbCritical)
cboUserType.Focus()
Return
Else
Try
Dim da As New OleDbDataAdapter("SELECT [Username] FROM tblAdminLogin WHERE [Username] = '" &
txtUsername.Text & "'", cn)
bmpImage.Save(ms, System.Drawing.Imaging.ImageFormat.Jpeg)
bytImage = ms.ToArray()
ms.Close()
Else
Try
bmpImage.Save(ms, System.Drawing.Imaging.ImageFormat.Jpeg)
bytImage = ms.ToArray()
ms.Close()
Else
Try
bmpImage.Save(ms, System.Drawing.Imaging.ImageFormat.Jpeg)
bytImage = ms.ToArray()
ms.Close()
Sub LoadRecord()
DataGridView1.DataSource = Nothing
cm = New OleDbCommand("SELECT * from tblAdminLogin", cn)
da = New OleDbDataAdapter(cm)
da.Fill(ds, "tblAdminLogin")
DataGridView1.DataSource = ds
DataGridView1.DataMember = "tblAdminLogin"
cn.Close()
DataGridView1.Refresh()
DataGridView1.RefreshEdit()
End Sub
Sub Clear()
txtUsername.Clear()
txtPassword.Clear()
txtCPassword.Clear()
cboQuestion.Text = ""
cboStatus.Text = ""
cboUserType.Text = ""
txtAnswer.Clear()
RegPic.Image = RegPic.InitialImage
End Sub
cboStatus.Text = DataGridView1.CurrentRow.Cells(5).Value.ToString
cboUserType.Text = DataGridView1.CurrentRow.Cells(6).Value.ToString
End Sub
41
End Class