DESIGN AND IMPLEMENTATION OF BIOMETRIC
EXAMINATION IMPERSONATION CHECKING
SYSTEM
(A STUDY OF COMPUTER SCIENCE DEPARTMENT, IMO STATE
POLYTECHNIC UMUAGWO)
TABLE OF CONTENTS
TITLE PAGE ......................................................................Error! Bookmark not defined.
CERTIFICATION PAGE ...................................................Error! Bookmark not defined.
DEDICATION ....................................................................Error! Bookmark not defined.
ACKNOWLEDGMENTS ..................................................Error! Bookmark not defined.
CHAPTER ONE ................................................................................................................. 5
INTRODUCTION............................................................................................................... 5
1.1 Overview of the Study ................................................................................................ 5
1.2 Background of the Study ............................................................................................ 6
1.3 Statement of Problem ................................................................................................. 8
1.4 Aim and Objectives of Study ..................................................................................... 8
1.5 Significance of the Study............................................................................................ 9
1.6 Scope of the Study ...................................................................................................... 9
1.7 Definition of Terms .................................................................................................. 10
1.8 Organization of Work ............................................................................................... 12
CHAPTER TWO ..................................................................Error! Bookmark not defined.
LITERATURE REVIEW ....................................................Error! Bookmark not defined.
2.1 Introduction ...............................................................Error! Bookmark not defined.
2.2 Conceptual Framework ............................................Error! Bookmark not defined.
2.2.1 The concept of Biometrics .......................................Error! Bookmark not defined.
2.2.2 Biometrics Evolution ..............................................Error! Bookmark not defined.
2.3 Review of Related Literature .................................Error! Bookmark not defined.
2.3.1 Fingerprint Verification ........................................Error! Bookmark not defined.
2.3.2 Fingerprint Features ..............................................Error! Bookmark not defined.
2.3.3 Physiology of the Skin ..........................................Error! Bookmark not defined.
2.3.4 Identification vs Verification ................................Error! Bookmark not defined.
2.3.5 Fingerprint Verification ........................................Error! Bookmark not defined.
2.3.6 Examination Malpractice ...................................Error! Bookmark not defined.
2.3.7 Dimensions of Examination Malpractices .........Error! Bookmark not defined.
CHAPTER THREE ..............................................................Error! Bookmark not defined.
RESEARCH METHODOLOGY AND SYSTEM ANALYSISError! Bookmark not defined.
3.1 Introduction ...............................................................Error! Bookmark not defined.
3.2 Research Methodology .............................................Error! Bookmark not defined.
3.2.1 Methodology Adopted and Reason for Structured System Analysis and
Design Methodology (SSADM) .........................................Error! Bookmark not defined.
3.3 Method of Data Collection .......................................Error! Bookmark not defined.
3.3.1 Interview Method ......................................................Error! Bookmark not defined.
3.4 Analysis of the Existing System...............................Error! Bookmark not defined.
3.5 Problems of the Existing System .............................Error! Bookmark not defined.
3.6 Proposal for New System .........................................Error! Bookmark not defined.
3.7 Justification of the New System ...............................Error! Bookmark not defined.
CHAPTER FOUR.................................................................Error! Bookmark not defined.
SYSTEM DESIGN AND IMPLEMENTATION ..............Error! Bookmark not defined.
4.1 Introduction..............................................................Error! Bookmark not defined.
4.2 File Design ................................................................Error! Bookmark not defined.
4.2.1 Input Specification ...................................................Error! Bookmark not defined.
4.3 Input Process and Output Process ...........................Error! Bookmark not defined.
4.4 Justification of Programming Language/ Tools UsedError! Bookmark not defined.
4.5 System Requirement .................................................Error! Bookmark not defined.
4.5.1 Hardware Requirements ..........................................Error! Bookmark not defined.
4.5.2 Software Requirements ............................................Error! Bookmark not defined.
4.6 System Testing..........................................................Error! Bookmark not defined.
4.7 System Maintenance .................................................Error! Bookmark not defined.
CHAPTER FIVE ..................................................................Error! Bookmark not defined.
SUMMARY CONCLUSIONS AND RECOMMENDATIONSError! Bookmark not defined.
5.1 Summary ..................................................................Error! Bookmark not defined.
5.2 Conclusion ................................................................Error! Bookmark not defined.
5.3 Recommendation ......................................................Error! Bookmark not defined.
REFERENCES....................................................................Error! Bookmark not defined.
ABSTRACT
Student Examination Verification System using Biometrics was aimed at implementing
examination verification system using finger print technology however this work design and
implementation the process of allowing students to sit for an examination in most
polytechnics has been through the presentation of medium of identification such as ID cards,
library cards, fees clearance cards, photo cards, etc. This piece of work is motivated by the
fact that the method of authenticating a student for an examination has an obvious problem
such as presentation of fake clearance card, impersonation and so on. The aim of this work
therefore is to design a system that will address issues of exam misconducts such as
impersonation and revealed the effectiveness of biometric system using fingerprint in
conducting examination verification consequently macro soft visual basic 6.0 is used as the
programming language while MS access is used for the database the research methodology
adopted is (SSADM). Structured system analysis and methodology the proposed system used
fingerprint biometric approach the system recognizes an individual by comparing his/her
biometrics with every record in the database rather than old manual method in use. The
expected result from the system is that the new system will compulsorily prompt for
biometric (fingerprint) in order to allow student gain access into the system for authentication
and identification of the real student before entering into examination hall.
CHAPTER ONE
INTRODUCTION
1.1 Overview of the Study
Biometric approach has become a prominent option and secured means of
authentication capable of sustaining the emerging universal computing. All
academic institutions have certain criteria for admitting students into
examination hall. That is why keeping the accurate record of attendance and
fees payments are very important. In almost all institutions in the developing
countries, clearance is usually done manually using paper sheets and old file
system approach. Biometric identification of a person is fast, easy-to-use,
precise, trustworthy and economical over traditional knowledge-based and
token-based methods. A biometric system contains mainly an image capturing
module, a feature extraction module and a pattern matching module. An image
capturing module acquires the raw biometric data of a person using a sensor.
Utilizing suitable algorithm/s feature extraction module improves the quality of
the captured image. Database module stores the biometric template information
of enrolled Persons. Pattern matching module compares the extracted features
with the stored templates, which in-turn generates match score.
1.2 Background of the Study
This approach discourages fraud, impersonation during the examination unlike
the paper clearance approaches which encourage fraud, impersonation etc. As
the level of security breaches and transaction fraud increases, the need for
highly secured identification and personal verification technology is fast
becoming apparent (Paul, Alane and Ari, 2004). Many organizations are trying
to identify accurate, safe, and reliable techniques to protect access rights to their
existing services or operations. Biometrics is the best answer to these concerns.
Biometric recognition approach techniques have emerged as most promising
option for securing valuable information or system based on their physiological
and/or behavioral characteristics. Because of the fact that individual’s biological
traits cannot be forgotten, forged, misplaced or stolen (Hambali 2015). The
relevance of biometrics in modern society has been reinforced by the need for
large-scale identity management systems whose functionality relies on the
accurate determination of an individual’s identity in the context of several
different applications. Biometrics offers a secured method of access to sensitive
services and obviates the need to carry a token, card or to remember several
passwords. Biometric techniques also reduce the risk of lost, forgotten or copied
passwords, stolen tokens or even shoulder attacks, yet despite these obvious
benefits, most biometric techniques are not pervasive in everyday life (Salil and
Anil, 2003). There are some significant reasons for this. The cost of deployment
of many techniques is very high; potentially requiring specialist analytical
software and machines with the computing power to run it. There is a lack of
standardization of many methods, and the wide variance of algorithms results in
different performance levels from comparable equipment. Additionally, end
users may refuse to use some types of biometric identification due to possible
hygiene misunderstandings, cultural differences or ethical issues (Farzad 2012).
The exception to this antipathy towards biometrics is fingerprint recognition
(FR) a well-known technique to identify individuals by comparing fingerprints
features with a pre-defined template which most people are familiar with
nowadays. FR is widely used today in places such as airports and legal system,
and it is built into devices such as laptops. Lot of work has been showcased in
literatures, which aim at identify and qualify the best methods and algorithms
for FR than any other biometric system; however, there is still not a categorical
standard algorithm for FR systems. Despite this, identification or authentication
through FR still has three main advantages (Maltoni and Prabhakar 2010)
i. Low cost of deployment (cost effective).
ii. Simple to implement and use.
iii. User must be physically available at the point of identification or
verification.
Biometrics system can be used in two ways: verification or identification. When
a biometric is used to verify whether a person is who he or she claims to be, that
verification is frequently referred to as “one-to-one” matching. Identification,
by contrast, is known as “one-to-many” matching. In identification, a person
presented biometric is compared with all biometric templates within a database
in order to get a match (Paul et al 2004).
1.3 Statement of Problem
After careful study of the existing system, the following problems were
observed:
i. Lack of student verification before starting examination
ii. In secured authentication of students
iii. Manual verification of student using only student identity cards
1.4 Aim and Objectives of Study
The aim is to design and implement a biometric examination impersonation
checking system while the objectives are as follow:
1. To design an interface for biometric examination impersonation checking
system.
2. To design and implement the database.
3. To recommend options for improvement in examination impersonation
detecting systems using biometrics technology.
1.5 Significance of the Study
The pursuits of knowledge on the diverse area of biometric systems envisage
its importance in providing strong authentication during examinations. This
project shows that using the fingerprint biometrics have edge over other ways
of identification. This plays a pivotal role for establishing identity not just
during student examinations but also for industries like law enforcement,
forensic science community and with general public. Other significance shows
that
i. The system would contribute in the area of stopping any activity of
corruption in the educational sector among students.
ii. The impersonation which has eating the educational system there by
encouraging laziness among students would be eliminated and standard
of student educational performance would be increased.
iii. Hard work would be encouraged as every registered student knows
he/she must write the exam by him or herself.
1.6 Scope of the Study
This project is limited to using fingerprints method as means of identification
and authentication. This identity verification will be capable of eradicating
impersonation and by extension contributes towards behavioral improvement
within the examination hall.
1.7 Definition of Terms
Algorithm is a self-contained sequence of actions to be performed. It precisely
defines sequence of operations to perform calculations, data processing tasks
and automated reasoning tasks. In simpler words: An algorithm is a set of steps
to accomplish a task
Application programming interface (API) is a set of routines, protocols, and
tools for building software applications.
Authentication: The process of identifying someone base on user’s name or
password in security system. It might involve confirming the identity of a
person by validating their identity documents,
Biometric Enrollment consists of user enrollment by presenting his or her
physiological or behavioral characteristics on a biometric recognition system
like a fingerprint scanner, iris scanner, palm vein scanner or retina scanner.
Biometric sample: Is the data obtained by a biometric system’s capture device,
for example a facial image, voice recording or a fingerprint scan.
Biometric Systems: is a system consisting software and hardware that can read
biometric characteristic of a person and process this data to generate a biometric
template, which can be used to establish the person’s identity or verify it.
Biometric Taxonomy: is a method of classification using gathered biometric
data. It can also be the classification of biometric data according to their use in a
given system.
Biometric Template: Is the digital representation of a biometric sample
collected by a biometric system for the purpose of user identification or
authentication.
Biometrics: The use of measurable, biological characteristics such as
fingerprints, or iris patterns to identify a person to an electronic system.
Database: A collection of related information which can be stored and
retrieved.
Examination: A measure for the test of knowledge.
Finger print: An impression on a surface of the curves formed by the ridges on
a fingertip.
Fingerprint Recognition is a method of identification of individuals on the
basis of their unique dermal ridge patterns on fingertips, which are commonly
known as fingerprints.
Spoofing: In general, is a fraudulent or malicious practice in which
communication is sent from an unknown source disguised as a source known to
the receiver? Biometric Spoofing is an act of imitating biometric characteristics
of an authorized user to deceive a biometric system and gain unauthorized
access.
Voice recognition is the process of identification of an individual using the
distinct characteristics of his or her voice.
1.8 Organization of Work
This research work is organized into five chapters. Chapter one is concerned
with the introduction of the research study and it presents the preliminaries,
theoretical background, statement of the problem, aim and objectives of the
study, significance of the study, scope of the study, organization of the research
and definition of terms.
Chapter two focuses on the literature review, the contributions of other scholars
on the subject matter are discussed.
Chapter three is concerned with the system analysis and design. It presents the
research methodology used in the development of the system, it analyses the
present system to identify the problems and provides information on the
advantages and disadvantages of the proposed system. The system design is also
presented in this chapter.
Chapter four presents the system implementation and documentation, the choice
of programming language, analysis of modules, choice of programming
language and system requirements for implementation. Chapter five focuses on
the summary, constraints of the study, conclusion and recommendations are
provided in this chapter based on the study carried out.
NOTE: PLEASE, print the following instructions and information if
you will like to order/buy our complete written material(s).
HOW TO RECEIVE PROJECT MATERIAL(S)
After paying the appropriate amount (#4000) into our bank Account
below, send the following information to 07067447694.
(1) Your project topics
(2) Email Address
(3) Payment Name
(4) Teller Number
We will send your material(s) immediately we receive bank alert
BANK ACCOUNTS
MAIN BANK ACCOUNT
Account Name: ONUOHA RAPHAEL U.
Account Number: 6171989833
Bank: Fidelity Bank.
For international students, you can send $15 BTC to this bitcoin wallet
address
BITCOIN ACCOUNTS
1GTC6F6yLeKPnxRy6HwgtEkj2Bv23cSHnw
HOW TO IDENTIFY SCAM/FRAUD
As a result of fraud in Nigeria, people don’t believe there are good
online businesses in Nigeria.
But on this site, we have provided “table of content and chapter
one” of all our project topics and materials in order to convince you
that we have the complete materials.
Secondly, we have provided our Bank Account on this site. Our Bank
Account contains all information about the owner of this website.
For your own security, all payment should be made in the bank.
No Fraudulent company uses Bank Account as a means of payment,
because Bank Account contains the overall information of the owner
CAUTION/WARNING
Please, DO NOT COPY any of our materials on this website WORD-TO-
WORD. These materials are to assist, direct you during your project.
Study the materials carefully and use the information in them to develop
your own new copy. Copying these materials word-to-word is
CHEATING/ ILLEGAL because it affects Educational standard, and we
will not be held responsible for it. If you must copy word-to-word please
do not order/buy.
That you ordered this material shows you have agreed not to copy word-
to-word.