Implementing fingerprint authentication in computer-based tests

نویسندگان

چکیده


 The use of computers to conduct examinations is more effective than traditional paper-based in terms immediate availability results and long term cost effectiveness. This however faced with identifying authenticating the real identities examinees so as reduce impersonation. study examined existing authentication method available on Computer-based test system Air Force Institute Technology (AFIT), Kaduna, Nigeria proposed fingerprint biometric technique an additional authenticate examinees. was developed using FlexCode SDK implemented DigitalPersona 4500 reader – recommended scanner by JAMB for enrollment. PHP scripting language XAMPP local server MySQL database system. obtained showed that there no need a middleware link module CBT because Single Sign-On implemented. result thus improved level access CBT. will therefore impersonation increase awareness academic stakeholders.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fingerprint Based Biometric ATM Authentication System

Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, handprint, face recognition, speech recognition, dental and eye biometrics. In t...

متن کامل

Wavelet Based Fingerprint Authentication System: a Review

Biometric recognition refers to the use of biological characteristics for identification and verification of individuals. Use of biometric is increasing nowadays because biometric characteristics are difficult to replicate and lifelong. Applications which require only the authorized persons to access the resources are information systems, National id systems, voter and driver registrations, doc...

متن کامل

Fuzzy Extractors for Minutiae-Based Fingerprint Authentication

We propose an authentication scheme using fingerprint biometrics, protected by a construct called a Fuzzy Extractor. We look at a new way of quantizing and digitally representing the minutiae measurements so that a construct called PinSketch can be applied to the minutiae. This is converted to a Fuzzy Extractor by tying some random information to the minutiae measurements. We run a matching alg...

متن کامل

Speech Authentication Based on Perceptual Fingerprint Hashing

A perceptual fingerprint hashing method is proposed for audio authentication in this paper. First, the biologic fingerprint image is divided into overlapping rectangle blocks by randomly using a chaotic sequence, and then the gravity center of each block is calculated. Finally, the perceptual Hashing value is generated based on the gravity center of each block. To authenticate the speech identi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nigerian Journal of Technology

سال: 2021

ISSN: ['0331-8443', '2467-8821']

DOI: https://doi.org/10.4314/njt.v40i2.14