Open Access   Article Go Back

Biometric Authentication for Online Examination

K.Kanimozhi 1 , M.Sakthivel 2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 162-164, Sep-2015

Online published on Oct 01, 2015

Copyright © K.Kanimozhi , M.Sakthivel . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K.Kanimozhi , M.Sakthivel , “Biometric Authentication for Online Examination,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.162-164, 2015.

MLA Style Citation: K.Kanimozhi , M.Sakthivel "Biometric Authentication for Online Examination." International Journal of Computer Sciences and Engineering 3.9 (2015): 162-164.

APA Style Citation: K.Kanimozhi , M.Sakthivel , (2015). Biometric Authentication for Online Examination. International Journal of Computer Sciences and Engineering, 3(9), 162-164.

BibTex Style Citation:
@article{_2015,
author = {K.Kanimozhi , M.Sakthivel },
title = {Biometric Authentication for Online Examination},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {162-164},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=660},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=660
TI - Biometric Authentication for Online Examination
T2 - International Journal of Computer Sciences and Engineering
AU - K.Kanimozhi , M.Sakthivel
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 162-164
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2347 2248 downloads 2421 downloads
  
  
           

Abstract

There are many biometric authentication methods such as face, finger print, iris, hand, veins, keystroke, signature, voice based authentication .Among that face recognition based research has been chosen under cost and time consuming factors.The main objective of the face recognition research is to recognize a sample face from a set of given authenticated student faces in order to provide more security. In this project principle component analysis (Eigen face approach) is applied to recognize a student face that is a face under different lightening and emotional condition. For comparison and experimental analysis simple approach such as user name and password based authentication and finger print based authentication are used. The final result is analysed and the face recognition method produces best result. The present invention of face recognition based authentication involves two phases such as, face detection which is the primary process and face recognition which is an authenticating phase. Face detection involves four main concepts. Firstly, face localization which separates parameter space and object space using Hough method and skin color information method[4]. The Second step is face normalization which extracts only the face by discarding all the surroundings. Third step is to locate facial characteristics using neural network .Finally the student face is extracted using Eigen face approach. After extracting the features of the face, all these features will be basically stored as a template that will be used for recognition. In recognition phase, the student face is captured and checked for authentication. Only if the face matches with the store template the student will be allowed for the examination. Like single face recognition multi face recognition system uses principle component analysis (PCA) technique[1]. To perform PCA five steps to be undertaken. The first step is subtracting the Mean of the data from each variable. The second step is calculating and forms a covariance Matrix. The third step is calculating Eigenvectors and Eigen values from the covariance Matrix. The fourth step is to choose a Feature Vector. Final step is multiply the transposed Feature Vectors by the transposed adjusted data.

Key-Words / Index Term

Hough Method, Face Color Information Method, Adaboosting method, Normalization, Normalization, Neural Network, Eigen Face Approach

References

[1] A. Gunjan Dashore, B. Dr. V.Cyril Raj, 2012 , An Efficient Method For Face Recognition Using Principal Component Analysis (Pca), Volume 2, Issue 2, (IJATER) pp:23-28.
[2] Rabia Jafri and Hamid R Arabnia, 2009,"A Survey of Face Recognition Techniques," Journal of Information Processing Systems, vol. 5, no. 2, pp. 41~68,.
[3] OLIVER, N., PENTLAND, A., AND BERARD, F. 1997. Lafter: Lips and face real time tracker. InProc. Computer Vision and Pattern Recognition, 123–129.
[4] PEER, P., KOVAC, J., AND SOLINA, F. 2003. Human skin colour clustering for face detection.In submitted to EUROCON 2003 – International Conference on Computer as a Tool.
[5] PHUNG, S. L., BOUZERDOUM, A., AND CHAI, D. 2002. A novel skin color model in ycbcr color space and its application to human face detection. In IEEE International Conference on Image Processing (ICIP’2002), vol. 1, 289–292.
[6] More VB.NET (Teach Yourself), Lowell Mauer, Sams Publication,2001.
[7] Guide to VB.NET ,Peter Norton, Sams Publication,1998.
[8] Fundamentals of Database System, Ramez , Addison-Wesley,1999
[9] Complete Guide to SQL server, Peter Norton, Sams Publication,1997.
[10] Http://www.Sourcecode.com
[11] Http://www.dbms.co.in
[12] Http://A1code.com
[13] www.dodcounterdrug.com/