0% found this document useful (0 votes)
6 views

Design and Implementation of Biometric e

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Design and Implementation of Biometric e

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

DESIGN AND IMPLEMENTATION OF BIOMETRIC

EXAMINATION IMPERSONATION CHECKING


SYSTEM
(A STUDY OF COMPUTER SCIENCE DEPARTMENT, IMO STATE
POLYTECHNIC UMUAGWO)

TABLE OF CONTENTS

TITLE PAGE ......................................................................Error! Bookmark not defined.


CERTIFICATION PAGE ...................................................Error! Bookmark not defined.
DEDICATION ....................................................................Error! Bookmark not defined.
ACKNOWLEDGMENTS ..................................................Error! Bookmark not defined.

CHAPTER ONE ................................................................................................................. 5


INTRODUCTION............................................................................................................... 5
1.1 Overview of the Study ................................................................................................ 5
1.2 Background of the Study ............................................................................................ 6
1.3 Statement of Problem ................................................................................................. 8
1.4 Aim and Objectives of Study ..................................................................................... 8
1.5 Significance of the Study............................................................................................ 9
1.6 Scope of the Study ...................................................................................................... 9
1.7 Definition of Terms .................................................................................................. 10
1.8 Organization of Work ............................................................................................... 12

CHAPTER TWO ..................................................................Error! Bookmark not defined.


LITERATURE REVIEW ....................................................Error! Bookmark not defined.
2.1 Introduction ...............................................................Error! Bookmark not defined.
2.2 Conceptual Framework ............................................Error! Bookmark not defined.
2.2.1 The concept of Biometrics .......................................Error! Bookmark not defined.
2.2.2 Biometrics Evolution ..............................................Error! Bookmark not defined.
2.3 Review of Related Literature .................................Error! Bookmark not defined.
2.3.1 Fingerprint Verification ........................................Error! Bookmark not defined.
2.3.2 Fingerprint Features ..............................................Error! Bookmark not defined.
2.3.3 Physiology of the Skin ..........................................Error! Bookmark not defined.
2.3.4 Identification vs Verification ................................Error! Bookmark not defined.
2.3.5 Fingerprint Verification ........................................Error! Bookmark not defined.
2.3.6 Examination Malpractice ...................................Error! Bookmark not defined.
2.3.7 Dimensions of Examination Malpractices .........Error! Bookmark not defined.

CHAPTER THREE ..............................................................Error! Bookmark not defined.


RESEARCH METHODOLOGY AND SYSTEM ANALYSISError! Bookmark not defined.
3.1 Introduction ...............................................................Error! Bookmark not defined.
3.2 Research Methodology .............................................Error! Bookmark not defined.
3.2.1 Methodology Adopted and Reason for Structured System Analysis and
Design Methodology (SSADM) .........................................Error! Bookmark not defined.
3.3 Method of Data Collection .......................................Error! Bookmark not defined.
3.3.1 Interview Method ......................................................Error! Bookmark not defined.
3.4 Analysis of the Existing System...............................Error! Bookmark not defined.
3.5 Problems of the Existing System .............................Error! Bookmark not defined.
3.6 Proposal for New System .........................................Error! Bookmark not defined.
3.7 Justification of the New System ...............................Error! Bookmark not defined.

CHAPTER FOUR.................................................................Error! Bookmark not defined.


SYSTEM DESIGN AND IMPLEMENTATION ..............Error! Bookmark not defined.
4.1 Introduction..............................................................Error! Bookmark not defined.
4.2 File Design ................................................................Error! Bookmark not defined.
4.2.1 Input Specification ...................................................Error! Bookmark not defined.
4.3 Input Process and Output Process ...........................Error! Bookmark not defined.
4.4 Justification of Programming Language/ Tools UsedError! Bookmark not defined.
4.5 System Requirement .................................................Error! Bookmark not defined.
4.5.1 Hardware Requirements ..........................................Error! Bookmark not defined.
4.5.2 Software Requirements ............................................Error! Bookmark not defined.
4.6 System Testing..........................................................Error! Bookmark not defined.
4.7 System Maintenance .................................................Error! Bookmark not defined.

CHAPTER FIVE ..................................................................Error! Bookmark not defined.


SUMMARY CONCLUSIONS AND RECOMMENDATIONSError! Bookmark not defined.
5.1 Summary ..................................................................Error! Bookmark not defined.
5.2 Conclusion ................................................................Error! Bookmark not defined.
5.3 Recommendation ......................................................Error! Bookmark not defined.
REFERENCES....................................................................Error! Bookmark not defined.
ABSTRACT

Student Examination Verification System using Biometrics was aimed at implementing


examination verification system using finger print technology however this work design and
implementation the process of allowing students to sit for an examination in most
polytechnics has been through the presentation of medium of identification such as ID cards,
library cards, fees clearance cards, photo cards, etc. This piece of work is motivated by the
fact that the method of authenticating a student for an examination has an obvious problem
such as presentation of fake clearance card, impersonation and so on. The aim of this work
therefore is to design a system that will address issues of exam misconducts such as
impersonation and revealed the effectiveness of biometric system using fingerprint in
conducting examination verification consequently macro soft visual basic 6.0 is used as the
programming language while MS access is used for the database the research methodology
adopted is (SSADM). Structured system analysis and methodology the proposed system used
fingerprint biometric approach the system recognizes an individual by comparing his/her
biometrics with every record in the database rather than old manual method in use. The
expected result from the system is that the new system will compulsorily prompt for
biometric (fingerprint) in order to allow student gain access into the system for authentication
and identification of the real student before entering into examination hall.
CHAPTER ONE

INTRODUCTION

1.1 Overview of the Study

Biometric approach has become a prominent option and secured means of

authentication capable of sustaining the emerging universal computing. All

academic institutions have certain criteria for admitting students into

examination hall. That is why keeping the accurate record of attendance and

fees payments are very important. In almost all institutions in the developing

countries, clearance is usually done manually using paper sheets and old file

system approach. Biometric identification of a person is fast, easy-to-use,

precise, trustworthy and economical over traditional knowledge-based and

token-based methods. A biometric system contains mainly an image capturing

module, a feature extraction module and a pattern matching module. An image

capturing module acquires the raw biometric data of a person using a sensor.

Utilizing suitable algorithm/s feature extraction module improves the quality of

the captured image. Database module stores the biometric template information

of enrolled Persons. Pattern matching module compares the extracted features

with the stored templates, which in-turn generates match score.


1.2 Background of the Study

This approach discourages fraud, impersonation during the examination unlike

the paper clearance approaches which encourage fraud, impersonation etc. As

the level of security breaches and transaction fraud increases, the need for

highly secured identification and personal verification technology is fast

becoming apparent (Paul, Alane and Ari, 2004). Many organizations are trying

to identify accurate, safe, and reliable techniques to protect access rights to their

existing services or operations. Biometrics is the best answer to these concerns.

Biometric recognition approach techniques have emerged as most promising

option for securing valuable information or system based on their physiological

and/or behavioral characteristics. Because of the fact that individual’s biological

traits cannot be forgotten, forged, misplaced or stolen (Hambali 2015). The

relevance of biometrics in modern society has been reinforced by the need for

large-scale identity management systems whose functionality relies on the

accurate determination of an individual’s identity in the context of several

different applications. Biometrics offers a secured method of access to sensitive

services and obviates the need to carry a token, card or to remember several

passwords. Biometric techniques also reduce the risk of lost, forgotten or copied

passwords, stolen tokens or even shoulder attacks, yet despite these obvious

benefits, most biometric techniques are not pervasive in everyday life (Salil and

Anil, 2003). There are some significant reasons for this. The cost of deployment
of many techniques is very high; potentially requiring specialist analytical

software and machines with the computing power to run it. There is a lack of

standardization of many methods, and the wide variance of algorithms results in

different performance levels from comparable equipment. Additionally, end

users may refuse to use some types of biometric identification due to possible

hygiene misunderstandings, cultural differences or ethical issues (Farzad 2012).

The exception to this antipathy towards biometrics is fingerprint recognition

(FR) a well-known technique to identify individuals by comparing fingerprints

features with a pre-defined template which most people are familiar with

nowadays. FR is widely used today in places such as airports and legal system,

and it is built into devices such as laptops. Lot of work has been showcased in

literatures, which aim at identify and qualify the best methods and algorithms

for FR than any other biometric system; however, there is still not a categorical

standard algorithm for FR systems. Despite this, identification or authentication

through FR still has three main advantages (Maltoni and Prabhakar 2010)

i. Low cost of deployment (cost effective).

ii. Simple to implement and use.

iii. User must be physically available at the point of identification or

verification.

Biometrics system can be used in two ways: verification or identification. When

a biometric is used to verify whether a person is who he or she claims to be, that

verification is frequently referred to as “one-to-one” matching. Identification,


by contrast, is known as “one-to-many” matching. In identification, a person

presented biometric is compared with all biometric templates within a database

in order to get a match (Paul et al 2004).

1.3 Statement of Problem

After careful study of the existing system, the following problems were

observed:

i. Lack of student verification before starting examination

ii. In secured authentication of students

iii. Manual verification of student using only student identity cards

1.4 Aim and Objectives of Study

The aim is to design and implement a biometric examination impersonation

checking system while the objectives are as follow:

1. To design an interface for biometric examination impersonation checking

system.

2. To design and implement the database.

3. To recommend options for improvement in examination impersonation

detecting systems using biometrics technology.


1.5 Significance of the Study

The pursuits of knowledge on the diverse area of biometric systems envisage

its importance in providing strong authentication during examinations. This

project shows that using the fingerprint biometrics have edge over other ways

of identification. This plays a pivotal role for establishing identity not just

during student examinations but also for industries like law enforcement,

forensic science community and with general public. Other significance shows

that

i. The system would contribute in the area of stopping any activity of

corruption in the educational sector among students.

ii. The impersonation which has eating the educational system there by

encouraging laziness among students would be eliminated and standard

of student educational performance would be increased.

iii. Hard work would be encouraged as every registered student knows

he/she must write the exam by him or herself.

1.6 Scope of the Study

This project is limited to using fingerprints method as means of identification

and authentication. This identity verification will be capable of eradicating

impersonation and by extension contributes towards behavioral improvement

within the examination hall.


1.7 Definition of Terms

Algorithm is a self-contained sequence of actions to be performed. It precisely

defines sequence of operations to perform calculations, data processing tasks

and automated reasoning tasks. In simpler words: An algorithm is a set of steps

to accomplish a task

Application programming interface (API) is a set of routines, protocols, and

tools for building software applications.

Authentication: The process of identifying someone base on user’s name or

password in security system. It might involve confirming the identity of a

person by validating their identity documents,

Biometric Enrollment consists of user enrollment by presenting his or her

physiological or behavioral characteristics on a biometric recognition system

like a fingerprint scanner, iris scanner, palm vein scanner or retina scanner.

Biometric sample: Is the data obtained by a biometric system’s capture device,

for example a facial image, voice recording or a fingerprint scan.

Biometric Systems: is a system consisting software and hardware that can read

biometric characteristic of a person and process this data to generate a biometric

template, which can be used to establish the person’s identity or verify it.

Biometric Taxonomy: is a method of classification using gathered biometric

data. It can also be the classification of biometric data according to their use in a

given system.
Biometric Template: Is the digital representation of a biometric sample

collected by a biometric system for the purpose of user identification or

authentication.

Biometrics: The use of measurable, biological characteristics such as

fingerprints, or iris patterns to identify a person to an electronic system.

Database: A collection of related information which can be stored and

retrieved.

Examination: A measure for the test of knowledge.

Finger print: An impression on a surface of the curves formed by the ridges on

a fingertip.

Fingerprint Recognition is a method of identification of individuals on the

basis of their unique dermal ridge patterns on fingertips, which are commonly

known as fingerprints.

Spoofing: In general, is a fraudulent or malicious practice in which

communication is sent from an unknown source disguised as a source known to

the receiver? Biometric Spoofing is an act of imitating biometric characteristics

of an authorized user to deceive a biometric system and gain unauthorized

access.

Voice recognition is the process of identification of an individual using the

distinct characteristics of his or her voice.


1.8 Organization of Work

This research work is organized into five chapters. Chapter one is concerned

with the introduction of the research study and it presents the preliminaries,

theoretical background, statement of the problem, aim and objectives of the

study, significance of the study, scope of the study, organization of the research

and definition of terms.

Chapter two focuses on the literature review, the contributions of other scholars

on the subject matter are discussed.

Chapter three is concerned with the system analysis and design. It presents the

research methodology used in the development of the system, it analyses the

present system to identify the problems and provides information on the

advantages and disadvantages of the proposed system. The system design is also

presented in this chapter.

Chapter four presents the system implementation and documentation, the choice

of programming language, analysis of modules, choice of programming

language and system requirements for implementation. Chapter five focuses on

the summary, constraints of the study, conclusion and recommendations are

provided in this chapter based on the study carried out.


NOTE: PLEASE, print the following instructions and information if
you will like to order/buy our complete written material(s).

HOW TO RECEIVE PROJECT MATERIAL(S)


After paying the appropriate amount (#4000) into our bank Account
below, send the following information to 07067447694.
(1) Your project topics
(2) Email Address
(3) Payment Name
(4) Teller Number
We will send your material(s) immediately we receive bank alert
BANK ACCOUNTS
MAIN BANK ACCOUNT
Account Name: ONUOHA RAPHAEL U.
Account Number: 6171989833
Bank: Fidelity Bank.

For international students, you can send $15 BTC to this bitcoin wallet
address
BITCOIN ACCOUNTS
1GTC6F6yLeKPnxRy6HwgtEkj2Bv23cSHnw

HOW TO IDENTIFY SCAM/FRAUD


As a result of fraud in Nigeria, people don’t believe there are good
online businesses in Nigeria.

But on this site, we have provided “table of content and chapter


one” of all our project topics and materials in order to convince you
that we have the complete materials.

Secondly, we have provided our Bank Account on this site. Our Bank
Account contains all information about the owner of this website.
For your own security, all payment should be made in the bank.
No Fraudulent company uses Bank Account as a means of payment,
because Bank Account contains the overall information of the owner
CAUTION/WARNING
Please, DO NOT COPY any of our materials on this website WORD-TO-
WORD. These materials are to assist, direct you during your project.
Study the materials carefully and use the information in them to develop
your own new copy. Copying these materials word-to-word is
CHEATING/ ILLEGAL because it affects Educational standard, and we
will not be held responsible for it. If you must copy word-to-word please
do not order/buy.

That you ordered this material shows you have agreed not to copy word-
to-word.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy