You are on page 1of 27

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/320856056

Designing Fingerprint Based Exam Hall Authentication A PROJECT REPORT


BACHELOR HONOURS DEGREE IN DIGITAL COMMUNICATION TECHNOLOGY
IN SIGNATURE SIGNATURE

Thesis · November 2017


DOI: 10.13140/RG.2.2.26381.23524

CITATIONS READS

0 9,170

1 author:

Mathew Ingashitula
International University of Management, Namibia
1 PUBLICATION   0 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Fingerprint Based Exam Hall Authentication View project

All content following this page was uploaded by Mathew Ingashitula on 05 November 2017.

The user has requested enhancement of the downloaded file.


Designing

Fingerprint Based Exam Hall Authentication

A PROJECT REPORT

Submitted by

Matheus S. Ingashitula

120016613

In partial fulfilment for the award of the degree of

BACHELOR HONOURS DEGREE IN DIGITAL


COMMUNICATION TECHNOLOGY

IN

NETWORKING AND SECURITY

INTERNATIONAL UNIVERSITY OF MANAGEMENT

November 2017

i
Bonafide Certificate

THE INTERNATIONAL UNIVERSITY OF MANAGEMENT

Certifies that this project report

Fingerprint Based Exam Hall Authentication

Is the Bonafide work of Matheus Shangeoshali Ingashitula who carried out the project

work under the supervision of

…………………………………………. ………………………………………….

SIGNATURE SIGNATURE

Mr Fundisi Mr Nkrumah

HEAD OF DEPARTMENT SUPERVISOR

Department of Networking and Security

59, Bahnhorf Street

Private bag 14005, Bachbrecht


ii
Abstract
This research Project is to develop fingerprint Based Exam Hall Authentication systems that assist in
the elimination of examination impersonation. Up till now, the Namibian Universities (particularly
IUM) Examination control board is not using fingerprint as mode of identification, this has resulted
in people sitting for examinations for others who collect the result at the end. With the adoption of
fingerprint biometric, this will be eliminated as fingerprint identification will also be employed
during collection of results and certificates. This target can be mainly decomposed into image pre-
processing, feature extraction and feature match. For each sub-task, some classical and up-to-date
methods in literatures are analysed. Based on the analysis, an integrated solution for fingerprint
recognition is developed for demonstration.

This demonstration program is coded using C programming language for the program, some
optimization at coding level and algorithm level are proposed to improve the performance of this
fingerprint recognition system. These performance enhancements are shown by experiments
conducted upon a variety of fingerprint images. Also, the experiments illustrate the key issues of
fingerprint recognition that are consistent with what the available literatures say. Main objective is to
eliminate any form impersonation during exam by employing a more secured means of fingerprint
biometrics.

iii
Acknowledgement
Profound gratitude goes to the project supervisor Engr. A. Nkrumah and also to the HOD Engr. J.
Fundisi for making this project a learning process, others in the trend are departmental lecturers and
a lots of friends in the Digital Communication Technology field, current once and also graduates.
Special gratitude goes out to Kelly Sazita (DCT student) who helped me with all kind of coding for
this project. Also to acknowledge my parents and my siblings for their great support during
academic pursuit; may the Almighty God bless them for me. My great thanks goes to God Almighty
who has made this project a success.

iv
Table of Content
Bonafide Certificate ............................................................................................................................................ ii

Abstract .............................................................................................................................................................. iii

Acknowledgement.............................................................................................................................................. iv

Table of Content.................................................................................................................................................. v

Table of Figure .................................................................................................................................................. vii

1 Chapter I: Introduction ................................................................................................................................ 1

1.1 Background ....................................................................................................................................... 1

1.1.1 Problem Statement ............................................................................................................... 2

1.1.2 Objectives ............................................................................................................................. 2

1.2 Scope ................................................................................................................................................. 2

1.2.1 Significance of the study .......................................................................................................... 2

1.2.2 Technical .............................................................................................................................. 3

1.2.3 Project timeline .................................................................................................................... 3

1.2.4 Definition of terms/variables used ....................................................................................... 3

2 Chapter II: Literature Review...................................................................................................................... 5

2.1 Technology used ............................................................................................................................... 5

2.1.1 Fingerprint Module: ............................................................................................................. 5

2.1.2 Microcontroller (ATmega328) ............................................................................................. 6

2.1.3 MC Programming Language: Embedded C ......................................................................... 8

2.1.4 Protease 8.0 .......................................................................................................................... 8

2.1.5 Motor Driver ........................................................................................................................ 9

2.1.6 Small Door ........................................................................................................................... 9

2.2 Similar work ...................................................................................................................................... 9

3 Chapter III: Methodology .......................................................................................................................... 10

3.1 Concept ........................................................................................................................................... 10

3.2 Block diagram ................................................................................................................................. 11

v
3.3 Operation......................................................................................................................................... 11

4 Chapter IV: Simulation/Prototype, Result & Analysis .............................................................................. 12

4.1 Simulation ....................................................................................................................................... 12

4.1.1 Connection diagram ........................................................................................................... 13

4.1.2 Operation ............................................................................................................................ 14

4.2 Results ............................................................................................................................................. 16

4.3 Analysis........................................................................................................................................... 16

5 Chapter V: Conclusion .............................................................................................................................. 17

5.1 Remarks .......................................................................................................................................... 17

5.2 Recommendation ............................................................................................................................ 17

5.3 New ideas ........................................................................................................................................ 18

6 References ................................................................................................................................................. 19

vi
Table of Figure
Figure 1: project timetable .................................................................................................................................. 3

Figure 2 Fingerprint scanner ............................................................................................................................... 6

Figure 3 Microcontroller ..................................................................................................................................... 8

Figure 4 Proteus view .......................................................................................................................................... 9

Figure 5: Block diagram in simple terms .......................................................................................................... 10

Figure 6: Block Diagram................................................................................................................................... 11

Figure 7 Simulated Circuit diagram .................................................................................................................. 13

vii
1 Chapter I: Introduction
Authentication has always been a major challenge in all types of examination. Verification of the
authentic candidate is not an easy task, and also it consumes a lot of time and process. This led to the
design of Fingerprint based exam hall authentication system that is designed to pass only users
verified by their fingerprint scan and block non verified users.

Formal examination can rightly be defined as the assessment of a person‘s Performance, when
confronted with a series of questions, problems, or tasks set him/her, in order to ascertain the amount
of knowledge that he has acquired, the extent to which he is able to utilize it, or the quality and
effectiveness of the skills he/she has developed. During the 19th century, formal written
examinations became regular in universities, schools, and other educational institutions.
Examinations were also increasingly employed for the selection of recruits to the civil service, and
the professions, and to posts in industry and commence. Over the ages, standardized testing has been
the most common methodology, yet the validity and credibility of the expanded range of
contemporary assessment techniques have been called into question.

There are two types of systems that help automatically establish the identity of a person:
1) Authentication (verification) systems and
2) Identification systems. In a verification system, a person desired to be identified submits an
identity claim to the system, usually via a magnetic stripe card, login name, smart card, etc., and the
system either rejects or accepts the submitted claim of identity (Am I who I claim I am?). In an
identification system, the system establishes a subject‘s identity (or fails if the subject is not enrolled
in the system database) without the subject‘s having to claim an identity (Who am I?). The topic of
this paper is channel towards the development of examination impersonation elimination system and
this system would strictly do with the unique feature of identification by means of finger print. A
verification system based on fingerprints, and the terms verification, authentication, and
identification are used in a loose sense and synonymously.

Accurate automatic personal identification is becoming more and more important to the operation of
our increasingly electronically interconnected information society. Traditional automatic personal
identification technologies to verify the identity of a person, which use ―Something that you know,
such as a personal identification number (PIN), or ―something that you have, such as an
identification (ID) card, key, etc., are no longer considered reliable enough to satisfy the security
requirements of electronic transactions or differentiate between an authorized person and an
impostor who fraudulently acquires the access privilege of the authorized person. Biometrics is a
technology that uniquely identifies a person based on his physiological or behavioral characteristics.
It relies on ―something that you are to make personal identification and therefore can inherently
differentiate between an authorized person and a fraudulent imposter.
1.1 Background
An examination board is an organization that sets examinations and is responsible for marking them
and distributing results. Examination boards have the power to award qualification to students. Most
exam boards are running as non-profit organizations. IUM is the first and only private owned
University in Namibia, which can offer qualification in variety of discipline and well-structured
certificates, High certificates, Diplomas, Honours Degrees, Master degrees and Doctorates in
different Disciplines such as Telecommunication, Information Technology, Human Resource,
Nursing, Education etc. For IUM to be recognised, Respected and set their standard height, it need to
establish a secure methods of registration, verification, identification and authentication to make sure
that who registered at the beginning of the year is the one who is going to seat to write that exam.
1
The systems that are used currently are not secure because it require a student to provide certain
physical documents such as student cards, examination admission slip, etc. This types of methods
(documents) can be forged by almost anyone in this fast growing computer technology world.
Adoption of Fingerprint Based Exam Hall Authentication system that permit only registered student
to enter exam hall and block anyone who wasn’t registered.

1.1.1 Problem Statement


The problems which are encountered in the previous identification systems are:

 Student impersonation

 Insecure authentication of students

 Manual verification of student

 Corruption in Examination System

1.1.2 Objectives
The objective of this study is as follows:

 To create a system that is capable of tracking impersonators in the examination system using
the methodology of finger print biometrics.

 To reduce rate of corruption in the educational sector and increase the rate of self-confidence
on students.

 To demonstrate the possibility of computer technology in the satisfaction of human needs


and also enforce strict security measures that ensure unregistered students do not write exams
for other registered students.

1.2 Scope
This system was implemented using the Proteus and C programming language and also all necessary
method of data collection within the reach to ensure the system met up to acceptable standard has
been put into consideration. Also this was carried out under close supervision by Engineer Nkrumah
for adequate guidance and interpretation of the work as it unfolds.

1.2.1 Significance of the study


With the increasing rate of exam malpractices in the educational sectors, the Universities
management deserve to inculcate a tight security means to ensure that these activities of exam
impersonators stops. The activities of these exam impersonators have seen the educational sector
suffer some serious form corruption ranging from registered student, to examination supervisor. So
it best for the educational body to set up strategies and some certain security means to stop this
aspect of corruption in the educational sector.

The system uses a finger prints biometrics, this will help ensure that only registered student during
registration with their finger prints are allowed into the examination hall. The system would
2
contribute in the area of stopping any activity of corruption in the educational sector among students,
and student to teachers. Hard work would be encouraged as every registered student knows he/she is
going to write the exam by him or herself. The impersonation which has been eating the educational
system there by encouraging laziness among students would be eliminated and standard of student
educational performance would be increased.

1.2.2 Technical
This system was implemented using Protease and C Programming Language: Embedded C and also
all necessary method of data collection reachable to ensure the system meet up to acceptable
standard has been put into consideration. Also this work would be carried out under close
supervision of Engineer Nkrumah for adequate guidance and interpretation of the work as it unfolds.
During the design of this system, the most of effort is on simulation lather than fabrication,
fabrication part of the system will come in place during implementation phase once everything in
place and running to avoid wasting of resources, because most of the equipment used in here were
bought and are very sensitive if handled otherwise.

1.2.3 Project timeline


DUE DATE PART FINISHED

10-03-2017 Proposal

07-04-2017 Chapter 1 and 2

12-05-2017 Chapter 3

25-08-2017 Chapter 4

22-09-2017 Chapter 5

27-10-2017 Presentation

03-11-2017 Hand in of the project report

Figure 1: project timetable

1.2.4 Definition of terms/variables used

DATABASE: A collection of related information which can be stored and retrieved.


EXAMINATION: A measure for the test of knowledge.
MALPRACTICES: This refers to negligence or misconduct.
IMPERSONATION: General process of acting on behalf of a client.
IMPERSONATOR: A performed skilled at copying the manner or expression of another mime.
FINGER PRINT: An impression on a surface of the curves formed by the ridges on a fingertip.
BIOMETRICS: Is the use of measurable, biological characteristics such as fingerprints, or iris
patterns to identify a person to an electronic system.
ELIMINATION: To get rid of.
3
DESIGN: Is a creative activity whose aim is to establish the multi-faceted qualities of objects
processes, service and their systems in whole life cycles.
SECURITY ACCESS: Permission granted to users base on their identification.
AUTHENTI CATION: The process of identifying someone base on users name or password in
security system.
AUTHORIZATION: Act of granting someone the permission to do or take something.

4
2 Chapter II: Literature Review
Biometrics is the use of measurable, biological characteristics such as finger prints or iris patterns to
identify a person to an electronic system. Once these measurements have been taken, they may then
be used to authenticate an individual or user. This is done by comparing the sampled biometric
against a template taken earlier. This process will be discussed in further detail below. Although
biometrics is viewed as an emerging technology, in reality, their use has been documented
throughout the history of mankind. In Egypt, thousands of years ago, it was common for individuals
to use physical traits or characteristics such as scars, eye and hair colour, height, etc., to identify
individuals for business transactions [1]. Biometrics is a rapidly evolving technology that has been
widely used in forensics, such as criminal identification and prison security, and has the potential to
be widely adopted in a very broad range of civilian applications.

Application such as, banking security, such as electronic fund transfers, ATM security, check
cashing, and credit card transactions, physical access control, such as airport access control;
information system security, such as access to databases via login privileges; government benefits
distribution, such as welfare disbursement programs customs and immigration, such as the
Immigration and Naturalization Service Passenger Accelerated Service System (INSPASS) which
permits faster immigration procedures based on hand geometry national ID systems, which provide a
unique ID to the citizens and integrate different government services Voter and driver registration,
providing registration facilities for voters and drivers.

Currently, there are mainly nine different biometric techniques that are either widely used or under
investigation, Including face, fingerprint, hand geometry, hand vein, iris, retinal pattern, signature,
voice print, and facial thermo grams Although each of these techniques, to a certain extent, satisfies
the above requirements and has been used in practical systems

2.1 Technology used


The design of the project is done in two stages, the hardware part and software section. The software
part is achieved using Protease 8.0 software and MC Programming Language: Embedded C. The
system block diagram and the system circuit diagram are shown in figure 1 and 2 respectively. The
hardware (device) comprises of the microcontroller, the fingerprint scanner, Motor Driver (L293D),
DC motor, small door, LEDs, Capacitors, Resistors and Diodes.

2.1.1 Fingerprint Module:

This is a fingerprint sensor module with TTL UART interface for direct connections to
microcontroller UART or to PC through MAX232 / USB-Serial adapter. Which can store the finger
print data in the module and can be configured in 1:1 or 1: N mode for identifying the person. The
FP module can directly interface with 3v3 or 5v Microcontroller. A level converter (like MAX232)
is required for interfacing with PC serial port.

Optical fingerprint imaging involves capturing a digital image of the print using visible light. This
type of sensor is, in essence, a specialized digital camera. The top layer of the sensor, where the
finger is placed, is known as the touch surface. Beneath this layer is a light-emitting phosphor layer
which illuminates the surface of the finger. The light reflected from the finger passes through the
phosphor layer to an array of solid state pixels (a charge-coupled device) which captures a visual
5
image of the fingerprint. A scratched or dirty touch surface can cause a bad image of the fingerprint.
A disadvantage of this type of sensor is the fact that the imaging capabilities are affected by the
quality of skin on the finger. For instance, a dirty or marked finger is difficult to image properly.
Also, it is possible for an individual to erode the outer layer of skin on the fingertips to the point
where the fingerprint is no longer visible. It can also be easily fooled by an image of a fingerprint if
not coupled with a "live finger" detector. However, unlike capacitive sensors, this sensor technology
is not susceptible to electrostatic discharge damage.

Optical biometric fingerprint reader with great features and can be embedded into a variety of end
products, such as: access control, attendance, safety deposit box, car door locks [1]
Features

 Integrated image collecting and algorithm chip together, All-in-one.

 Fingerprint reader can conduct secondary development, can be embedded into a variety of
end products.

 Low power consumption, low cost, small size, excellent performance.

 Professional optical technology, precise module manufacturing techniques.

 Good image processing capabilities, can successfully capture image up to resolution 500 dpi.

Figure 2 Fingerprint scanner

2.1.2 Microcontroller (ATmega328)

The Atmel 8-bit AVR RISC-based microcontroller combines 32 KB ISP flash memory with read-
while-write capabilities, 1 KB EEPROM, 2 KB SRAM, 23 general purpose I/O lines, 32 general
purpose working registers, three flexible timer/counters with compare modes, internal and external
interrupts, serial programmable USART, a byte-oriented 2-wire serial interface, SPI serial port, 6-
channel 10-bit A/D converter (8-channels in TQFP and QFN/MLF packages), programmable
watchdog timer with internal oscillator, and five software selectable power saving modes. The
device operates between 1.8-5.5 volts. The device achieves throughputs approaching 1 MIPS per
MHz [1]

6
The choise of this type of microcontroller is influenced by the number of ports and internal memory
that the component poses, enough ports to connect all of the components of the project and the
enough memory for buffering and store fingerprints scan samples for simulation purposes.

Features [1]

 High Performance, Low Power AVR 8-Bit Microcontroller

– Advanced RISC Architecture

– 131 Powerful Instructions

– Most Single Clock Cycle Execution

– 32 x 8 General Purpose Working Registers

– Fully Static Operation

– Up to 20 MIPS Throughput at 20 MHz

– On-chip 2-cycle Multiplier

 Flash Program Memory: 32 kbytes

 EEPROM Data Memory: 1 kbytes

 SRAM Data Memory: 2 kbytes

 I/O Pins: 23

 Timers: Two 8-bit / One 16-bit

 A/D Converter: 10-bit Six Channel

 PWM: Six Channels

 RTC: Yes with Separate Oscillator

 MSSP: SPI and I²C Master and Slave Support

 USART: Yes

 External Oscillator: up to 20MHz

7
Figure 3 Microcontroller

2.1.3 MC Programming Language: Embedded C

This is the most widely used programming language for embedded processors/controllers. Assembly
is also used but mainly to implement those portions of the code where very high timing accuracy,
code size efficiency, etc. are prime requirements. Embedded C is perhaps the most popular
languages among Embedded Programmers for programming Embedded Systems. There are many
popular programming languages like Assembly, BASIC, C++ etc. that are often used for developing
Embedded Systems but Embedded C remains popular due to its efficiency, less development time
and portability.

2.1.4 Protease 8.0

The Proteus Design Suite is a proprietary software tool suite used primarily for electronic design
automation. The software is used mainly by electronic design engineers and technicians to
create schematics and electronic prints for manufacturing boards. It was developed in Yorkshire,
England by Lab center Electronics Ltd and is available in English, French, Spanish and Chinese
languages. Schematic capture in the Proteus Design Suite is used for both the simulation of designs
and as the design phase of a PCB layout project. It is therefore a core component and is included
with all product configuration.

Use Proteus software with its strong function in the simulation and analysis to simulate the
microcontroller and its peripheral equipment. Design, debug and modify hardware and software of
the microcontroller system on the computer. Draw the physical circuit after the successful circuit
simulation. It forms a new system design model is: schematic design - simulation circuit design and
modification - physical production and testing. The model makes the flaws exposed early in the
design, shorts design cycles and reduces experimental costs. While also maximizing student's
learning initiative and innovation. It is of great significance in developing innovative and practical
talent, reforming the traditional teaching model and improving the quality of experimental teaching.

Proteus diagram

8
Figure 4 Proteus view

2.1.5 Motor Driver


This is a motor driver IC that can drive two motor simultaneously. L293D IC is a dual H-bridge
motor driver IC. One H-bridge is capable to drive a dc motor in bidirectional. Motor Driver cannot
connect a motor directly because microcontroller cannot give sufficient current to drive the DC
motors. Motor driver is a current enhancing device, it can also be act as Switching Device. Thus we
insert motor driver in between motor and microcontroller. Motor driver take the input signals from
microcontroller and generate corresponding output for motor.

2.1.6 Small Door


This will be used to represent the entrance of the examination hall through which students need
access to.

2.2 Similar work


 Embedded computer based lecture attendance management system was proposed. Although
this was an in-proved system with electronic card reader serially interfaced to a personal
computer, the demerit of such system is that someone can still take attendance for another
person if given the person’s electronic card.

 Wireless attendance management system that authenticates using the iris of the individual.
This system uses an off-line iris recognition management system for image capturing,
extracting precise details, storing and matching the captured image with one stored in the
database. This system takes care of wrong clocking in or buddy-punching. Buddy punching
is when one worker or student inappropriately clocks in for another. The only problem this
type of biometric system has is that people usually have the fear that the Iris scanner, after
sometimes might contribute to the damage of their eye and so tend not to embrace it.

 Another designed and implemented system was a system that authenticates the user based on
passwords. This system still could not eliminate impersonation since the pass-word can be
shared or tampered with. Passwords many times can be forgotten or the system hacked
thereby preventing user’s access to the system. [1]

9
3 Chapter III: Methodology
A research methodology is a systematically programming approach of a well-defined procedure that
should be followed in caring out a thorough research work. An adequately suitable methodology
would ensure a very detail research work and ensure a higher degree of accuracy and efficiency is
adopted. In other to attain quiet a reasonable acceptance of the research work, the internationally
accepted software engineering model was used, which is During authentication, the biometrics of the
user is captured again and the extracted features are compared (using a matching algorithm) with the
ones already existing in the database to determine a match. It has been established that physical
achieves are not always helpful a much better alternative is to use biometrics concept that can
facilitate stronger security to the problem of exam impersonation.

This implies the creation of database management system (DBMS) which ensure that computer
records are kept up to date and made available on demand to those who need them for planning and
operational purpose. The level of success achieved in caring out this research work is owed to the
methodology adopted.

3.1 Concept
This examination impersonation elimination system that uses manual identification. In identification,
the system recognizes an individual by comparing his/her biometrics with every record in the
database. In general, biometric identification consists of two stages: Enrollment and Authentication.
During enrollment, the biometrics of the user is captured (using a fingerprint reader, which are likely
to be an optical, solid state or an ultrasound sensor or other suitable device) and the unique features
are extracted and stored in a database as a template for the subject along with the student ID. The
objective of the enrolment module is to admit a student using his/her ID and fingerprints into a
database after feature extraction. These features form a template that is used to determine the
identity of the student, formulating the process of authentication. The enrollment process is carried
out by an administrator in the examination system.

Figure 5: Block diagram in simple terms

10
3.2 Block diagram

Figure 6: Block Diagram

3.3 Operation
The system need regulated DC power supply to power the components and the power need to be
regulated because, this components need stable power supply and at the certain limit. When the
system is powered on the lime bright green light is displayed on the LCD display to show that the
system is on, the few seconds later, the following message is displayed on the LCD display:
(“Fingerprint based exam hall authentication”) the name of the system, then two seconds later it will
display for the user to place the finger on the fingerprint scanner for the fingerprint scan to be
captured for authentication. The comparison is done by the microcontroller, compering the recently
captured with the one in the database stored after registration phase, if there is a match then the
system will ask for a passkey and if the passkey is correct then the microcontroller will signals the
Motor drive to open the door to the exam hall. If there is no match between the fingerprints then the
system will display that access denied, student not registered, it will never ask for passkey.

To sum the operation up, this system consists of a fingerprint scanner connected to a microcontroller
circuit. The person needs to first scan his/her finger on the scanner. The microcontroller now checks
the persons fingerprint validity. If the fingerprint is authorized the microcontroller now sends a
signal to a motor driver. The motor driver now operates a motor to open a gate. This ensures only
authorized users are allowed to enter the examination section and unauthorized users are not allowed
to enter.

Hardware Specification:

 Finger Print Module


11
 Microcontroller (Atmega 328)

 Motor Driver (L293D)

 DC motor

 Small Door
 LED’s
 Capacitors
 Resistors
 Diodes

 Hard Disk : 40 GB
 Processor : Any processor above 500 MHz
 RAM : Above 512 MB
 Input device : Standard Keyboard and Mouse.
 Output device : VGA and High Resolution Monitor.

Software Specifications

 Protease 8.0 software

 MC Programming Language: Embedded C

 Operating system : Windows Family

4 Chapter IV: Simulation/Prototype, Result & Analysis


4.1 Simulation
Due to some short falls and unavailability of needed electronic components and hardware’s for this
project, the proposed plan to simulate and to fabricate of this project was not achieved, this was due
to several reasons such as; there are no hardware/electronic components stores in Namibia, and it is
difficult to order from India and the cost for the items and shipment is much high. Due to that,
simulation was the only phase which is in place right now and there are some changes on the initial
proposed plan as well, because some components such as FINGERPRINT SCANNER cannot
simulated on the PC with no touch screener, so a virtual terminal was used instead of a fingerprint
scanner. Here, when the system ask the student to place her/his finger, the student number is copied
from the notepad and pasted on the virtual terminal and the Authentication can happen instead of the
fingerprint. The connection diagram of the simulated system is shown on figure5 bellow to give more clear
understanding of the explanation in this paragraph.

12
4.1.1 Connection diagram

# 0 D

C1
X1 9 8 7 C
22uF CRYSTAL
C2
6 5 4 B
19 39
XTAL1 P0.0/AD0
22uF 38
LCD1 P0.1/AD1
37
LM016L 18
XTAL2
P0.2/AD2
P0.3/AD3
36 3 2 1 A
35
P0.4/AD4

1
34
P0.5/AD5
U1(EA) 33
P0.6/AD6
9 32
RST P0.7/AD7
21
P2.0/A8
22
P2.1/A9
VDD
VSS

VEE

RW

23
RS

D0
D1
D2
D3
D4
D5
D6
D7
P2.2/A10
E

29 24
PSEN P2.3/A11
30 25
ALE P2.4/A12
1
2
3

4
5
6

7
8
9
10
11
12
13
14

31 26
EA P2.5/A13
27
P2.6/A14
28
P2.7/A15
RV1(2)
1 10
P1.0 P3.0/RXD
2 11
RV1 P1.1 P3.1/TXD
3 12
P1.2 P3.2/INT0
4 13
P1.3 P3.3/INT1
5 14
P1.4 P3.4/T0
6 15
P1.5 P3.5/T1
7 16
P1.6 P3.6/WR
8 17
P1.7 P3.7/RD
100 AT89C51

RXD
VT52, VT100, ANSI
TXD

RTS
Xmodem, Ymodem, Zmodem
CTS

Figure 7 Simulated Circuit diagram

13
4.1.2 Operation
Due to human body features with no duplicate characteristics, people put eyes turned to biometrics.
Computer fingerprint identification automatic identification technology is the earliest and the most
practical and the mature technology among the identification technology. This design such an
implementation where we first collect or enroll the finger print of the students who is going to write
the examination and store them in eeprom. When student enters the exam hall the system asks for
fingerprint and then controller checks for valid person or not. If he is a valid person it allows him
otherwise it intimates the invigilator through BUZZER.

The process model behind a biometric system is generally the same regardless Of the biometric
being used. While there will be obvious differences in how Measurements are collected, stored, etc.,
depending on the biometric chosen or the specific product, the theoretical model remains the same
across all types.

4.1.2.1 Collecting and Enrolment

The first step in any biometric system is collection of the biometric being used. The device used to
capture the initial sample will vary depending on the type of physical trait being collected. This
could be a reader or sensor used to scan a Fingerprint or palm or a camera to capture facial images or
certain aspects of the Retina or iris. In any event, before using the system for the first time for
Authentication the user must enroll their biometric sample. This entails the user presenting a live‖
biometric sample of the chosen trait a requisite numbers of Times, usually at least three, so that the
system may produce/build a template. In Most cases, this template is then matched with another
identifier or reference id, Such as a PIN. Going forward, the user will then enter their PIN, which
will tell the system which template to use when comparing against for authentication.

The task of building the template is also sometimes referred to as extraction of the biometric. This is
due to the fact that most biometric systems do not store full Images of the biometric in the way that
law enforcement agencies store Fingerprints. Rather, certain aspects or points of the biometric are
extracted‖, and converted into a mathematical code. The attribute extracted depends on the type of
biometric you are working with and will be examined more closely when the individual types are
reviewed. As noted above, multiple samples of a trait are taken in an attempt to produce the best
quality template possible. This will allow or take into consideration the subtle differences in such
things as speech inflection or varying degrees of pressure when a palm or finger is pressed against a
reader. It may also include such things as having user‘s present different facial expressions or using
varying degrees of light when taking samples. Collecting a quality sample and building a good
template may be the most crucial part of the process. A poor quality template could result in false
rejection and require re-enrollment into the system. A stronger template will also help make the
system more secure.

4.1.2.2 Template Storage

After a user has enrolled in the system and their template has been extracted, that template must be
stored so that it may be retrieved later for comparison. There are three main options for template
storage, each with its advantages and disadvantages.
The options are:
1. Store the template at the biometric reading device
2. Store the template remotely in a centralized database
3. Store the template on a portable token (smart card)
14
The main advantage to storing the templates within the biometric reading device is faster response
time. If your templates are stored at the reader you will not have to wait on other system or network
resources. Most systems can effectively handle the storage and retrieval of a small amount of
templates. But if you have several thousand users, this may pose a problem. If that is the case, you
may be better off storing your templates in a centralized database. Additionally, if something were to
happen to the reader/system you could potentially completely lose all of your templates. Then re-
enrollment of all of your users would be required. Storing your templates in a centralized database
makes the most sense if you have many users or multiple systems. It also allows the use of more
layers of security to be applied to the process. The main disadvantages would be the additional
resources needed to maintain the additional system and the network Traffic created between the
biometric reader and the database. Additionally, if the network were to be down for some reason, the
biometric readers would be useless.

Storing the template on a smart card has the main advantage that the user will have sole possession
of their trait. They may also then use the card at any number of readers or devices, making it more
convenient for the organization to position readers at different locations. Although this storage
technique may make the end user feel more comfortable it may not be in the best interest of the
organization. Issuing cards to all users may become cost prohibitive. In addition, it may become
more costly if the user were to lose their card and re-enrollment plus re-issuing of a card became
required. The best storage solution for an organization may be the implementation of multiple
storage systems. This will allow the organization to combine the benefits of the solutions and at the
same time negate some of the potential disadvantages. Again, the main disadvantage here would be
the prohibitive cost. But for organizations that are able to justify the cost, it would be beneficial to
Store the template at both the device level as well as at a central database. The Increased response
time could be utilized and the templates would not be lost if there was a failure at either level
individually.

4.1.2.3 Comparison and Matching


Each time a user attempts to authenticate against the system, another live‖ Biometric sample is taken.
Much the same as in the enrollment, the sample is then extracted producing another mathematical
code or template. This template is then compared to the previous template stored in the system. If
the specified requirements for a match are met, the user is authenticated. If the template Taken is not
within the successful parameters, the result is a non-match. Some biometric devices will allow the
organization to set the number of attempts allowed for successful authentication. Although you will
want to allow reasonable number of attempts in order to let genuine users authenticate, you do not
want to allow so many attempts that it may comprise the secure-ness of the system. Meaning you
don‘t want to give a hacker an exorbitant amount of tries at defeating the system. Additionally, some
biometric systems may update the stored template each time a live sample is taken. This will help
update the template with any changes that may have occurred to the biometric over time. This could
include minor cuts and scrapes, aging, etc. Of course any major Change to the biometric should
result in a non-authentication and re-enrollment may be required. [1]

4.1.2.4 4. Authentication process


When the system (Fingerprint based exam hall Authentication) powered on, it will display the
following statement on the LCD display unit: “FINGERPRINT BASED EXAM HALL
AUTHENTICATION”, this statement is of no much purpose but to show that that is the name of the
system. Few seconds later, the following statement will pop up: “PUT YOUR FINGER” this
message hold two purposes; 1. is to show that the fingerprint model/scanner is now active or it is
15
now powered on to function and 2. To let the subject (student) to be authenticated that he/she must
place his/her finger on the fingerprint scanner for authentication. After the finger has been placed on
the scanner, the system will choose to display between this two statements depend on the status of
the subject Authenticated, the statements are as follow: 1. “ENTER YOUR PASSKEY” 2.
“ACCESS DENIED, STUDENT NOT REGISTERED’’, the first statement is displayed when the
student is real registered and is now telling the student to enter the password that is given to the
student during registration process. The second statement is to tell the student that is not registered.
Once the password entered is correct, the following statement is displayed and the door of the Hall is
automatically opened, the statement: “ACCESS GRANTED”.

4.2 Results
By using this project the design and implementation of ID authentication system based on
Fingerprint Identification is designed, and finally, the problem at hand, which is exam student
impersonation and corruption is Tertial Education will be demolished and to demonstrate that
anything can be achieved using computer technology in this fast growing Information Technology
and computer communication world . Simulation phase of this project has been achieved, with the
following devices: Microcontroller (Atmega 328), LCD display device (LM016L), regulated DC
power supply, Keypad-phone, Virtual Terminal, X1 Crystal clocking, Variable Resistor, and
Capacitors.

Regulated DC power supply is used for powering the devices on the system and it has to be
regulated to avoid too much power to burn the device and to be too low for it to be insufficient for
the devices operations. Microcontroller, this is the heart of the whole system, it is there to facilitate
the connection between devices, control the operation of every device connected on this system, it
has clocking equipment that must be synchronised with the crystal clocking device to ensure precise
operation of the system. Keypad, this device is used as a input device used by the user (student)
when they are entering their password during authentication process. LCD display is used as the
output device of the whole system because, every message that the system need to convey to the
user, is display on here, starting from displaying the name of the system (Fingerprint based exam
hall authentication), asking the user to place their fingers (Put your finger), displaying the results of
the authentication (Enter the passkey or Access denied student not registered) and the final display if
the user’s passkey is correct (Access granted). Variable resistor, this is to give brightness to the LCD
display. Crystal Clocking, this has the simple task, which is to provide clocking to the system,
clocking which is synchronised with the clock of the microcontroller. Virtual Terminal is used as
input device as well to input the student number of the student when the system ask the user to put
their finger, because there is no fingerprint scanner on the system, so this device is used in the
simulation phase. And the final device are the capacitors, which are used to prevent the unwanted
current from entering the system.
4.3 Analysis
Although it was not an easy job, to prove that the proposed system is working according to how the
real systems work. This was proved by implementing the project in simulation but its working
according to the way it is intended to work. By simulating this project one will see the display on the
LCD, the system writing the name of the project “Fingerprint based exam hall Authentication”, few
seconds later it will display the following message: “PUT YOUR FINGER” this is just to tell the
subject (student) to be authenticated to put her/his finger on the fingerprint scanner for it to be able
to read his/her fingerprints, after that if the student is authentic then the following message will be
displayed: “ENTER YOUR PASSKEY”, this is a password that every registered student got during

16
registration/enrolment phase, and if the password entered is correct then access is granted, so the
following message will be displayed on the LCD display: “WELCOME, ACCESS GRANTED” and
the microcontroller will send the signal to the motor driver that drives the door to open automatic.
Furthermore, if the student is not authentic then the system will never ask the student to enter the
passkey but will display the following message: “ACCESS DENIED, STUDENT NOT
REGISTERED” which means that particular student is not in the system, he/she is not registered.

5 Chapter V: Conclusion
In this paper a Biometric Model for Examination impersonation and Biometric Access is a better
substitute for the use of Identity card in verifying users ‘identity Experience has shown the porosity
of Identity cards in uniquely identifying individual in the face of sophisticated Forgery technology.
The naturalness in the use of fingerprint makes it a reliable access control technique. The fact that a
user no longer needs to carry identity cards and other documents for identification explain the ease
of use.

The Exam hall authentication system using fingerprints. The implemented minutiae extraction is
much more accurate and faster than our previous feature-extraction. In our proposed system
accurately verify the fingerprint is valid user or not. If valid user then it allow attending the exam
else not allowed. In this experimental result shows the proposed method is suitable for all the
authentication based application and also it robust.

5.1 Remarks
In this paper a Biometric Model for Examination impersonation and Biometric Access is a better
substitute for the use of Identity card in verifying users (students) identity. Experience has shown the
porosity of Identity cards in uniquely identifying individual in the face of sophisticated Forgery
technology. The naturalness in the use of fingerprint makes it a reliable access control technique.
The fact that a user no longer needs to carry identity cards and other documents for identification
Explain the ease of use. Future work may see to the implementation of the proposed model in
Examination Halls and every access point. Apart from the fact that it takes us to another level in
human machine interface, it is economical and easy to use, it should be adopted by Educational
institutions in Namibia.
5.2 Recommendation
The fingerprint biometric as good as it is, in improving security, has some challenges which require
further work. The first of these challenges is spoofing i.e. the use of forged biometric object (e.g.
Plastic finger) in accessing a secured system. An example of such is described in an article published
by a group from Yokohama National University in Japan. In this article Matsumoto and colleagues
developed a method to spoof fingerprint devices [1] by making a mold from plastic, originating from
both a live finger and a latent fingerprint. Artificial fingers were then created from the casts using
gelatin, commonly used for confectionary, where the resultant casts were termed gummy fingers.
The resultant artificial finger works perfectly like the original natural finger in identifying the user.
This development poses a serious challenge to the future of biometrics. However, a readymade
solution to this problem is aliveness detection. [1]

The goal of aliveness testing is to determine if the biometric being captured is an actual
measurement from the authorized, live person who is present at the time of capture. Another
challenge is the security of the biometric template. Once this is compromised the user loses his
identity for life. A compromised PIN can be changed to remove security threat but this is not the
17
same for biometric template because of its permanence. The recommendation is that more works
need to be done in evolving a more robust aliveness detection algorithm that eliminate the danger of
spoofing and guarantee a true identification of the user.
5.3 New ideas
 Biometric access using both fingerprints and blood flow detection to avoid cloning of fingers
using plastics as described above.
 Fingerprint based ATM project.
 Fingerprint based student attendance using GSM, this is to eliminating manual attendance
that any student can sign for the other student.
Books Referred
 The 8051 Microcontroller and Embedded systems” by Muhammad Ali Mazidi and Janice
Gillispie Mazidi , Pearson Education.
 ATMEL 89S52 Data Sheets.

18
6 References

[1] T. M. e. al, japan: Yokohama National University, 2002.

[2] M. A. M. a. J. G. Mazidi, The 8051 Microcontroller and Embedded systems” ,, Pearson


Education..

[3] ATMEL 89S52 Data Sheets..

[4] D. Awanb or, Credentialing process in the Nigerian educationalUsers, Identity in Automatic
Teller Machine, International Journal, LAGOS, 2005.

[5] Artificial „Gummy‟ Fingers on Fingerprint Systems”, Proceedings of SPIE,.

[6] E. I. BRIDGET, EXAMINATION VERIFICATION SYSTEM USING BIOMETRIC(A CASE


STUDY OF WAEC), July 2013.

19

View publication stats

You might also like