An Online Examination System Using Wireless Security Application 2013

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013
An Online Examination System Using Wireless
Security Application
1
Madhu Babu Anumolu, 2N.Bharadwaj
1
2
M.Tech, Dept of ECE, CMR College of Engineering and Technology, Hyderabad, AP-India,
Assoc Prof, Dept of ECE, CMR College of Engineering and Technology, Hyderabad, AP-India,
Abstract— This paper is implemented for online examination
security system. Here we are using finger print module for
identification of each student and a web cam for taking the image
of each student, all the finger prints and images will be stored in
the data base using zigbee wireless protocol. This paper operation
is done in two modes Enrolment mode and Verification mode. If
any finger print (or) image mismatch occur while verification of
each student when entering into the examination hall then the
buzzer will be blown.
Keywords— ARM7, ARM9, Finger print module, PC, Web cam,
Zigbee
I.INTRODUCTION
To provide security for online examination this
system has been designed and implemented. In this system we
are using finger print module, Zigbee protocol, LCD. This
paper is build around ARM7 & ARM9. By this
implementation we can achieve full level security system for
online examination. As we see now a days in so many
examination centres, most of the students appearing as fake
persons for writing exams. Even though the examination
branch of related university taking enough precautions to
prevent situations like this, they are not completely
eliminating.
Fingerprint identification is the oldest method that
has been successfully used in various applications. A
Fingerprint, as the name suggests is the print or the impression
made by our finger because of the patterns formed on the skin
of our palms and fingers. It is fully formed at about seven
months of fetus development and finger ridge configurations
do not change throughout the life of an individual. Each of our
ten fingerprints is different from one another and from those
of every other person. Even identical twins have unique
finger-prints. That makes them ideal for personal
identification. With age, these marks get prominent but the
pattern and the structures present in those fine lines do not
undergo any change. For their permanence and unique nature,
they have been used for not only in identification but also in
the field of security as criminal and forensic investigation for
a long time. Every fingerprint consist ridges and furrows
where the ridges are thick lines while the furrows are space
between two ridges. An example of this fingerprint based
security system for the national security like examination
security of a nation to prevent an unauthorized person to enter
into the examination hall because an unauthorized person may
enter by easily manipulating the security guard or any other
manual security system. For entering, a person can scan their
finger on the fingerprint sensor module at the important entry
ISSN: 2231-5381
place of the examination hall in perfect manner. If their
fingerprint matched with the fingerprints of the database
which has made for examination authorized person, then the
person can enter otherwise they will be denied.
II. RELATED WORK
A. ARM9 (Mini2440 | S3C2440 ARM9 Board):
The Friendly ARM Mini2440 is a single board computer
based on a Samsung S3C2440 ARM9 microprocessor. The
S3C2440A is developed with ARM920T core, 0.13um CMOS
standard cells and a memory complier. Its low power, simple,
elegant and fully static design is particularly suitable for costand power-sensitive applications. It adopts a new bus
architecture known as Advanced Micro controller Bus
Architecture (AMBA).
Figure1: Friendly ARM
B.ARM7 (LPC2148):
The ARM7TDMI-S is a general purpose 32-bit
microprocessor, which offers high performance and very low
power consumption. The ARM architecture is based on
Reduced Instruction Set Computer (RISC) principles, and the
instruction set and related decode mechanism are much
simpler than those of micro programmed Complex Instruction
Set Computers. This simplicity results in a high instruction
throughput and impressive real-time interrupt response from a
small and cost-effective processor core. Pipeline techniques
are employed so that all parts of the processing and memory
systems can operate continuously.
http://www.ijettjournal.org
Page 3885
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013
Typically, while one instruction is being executed, its
successor is being decoded, and a third instruction is being
fetched from memory.
mesh network form to transmit data over longer distances,
passing data through intermediate devices to reach more
distant ones and also device can be tasked with running
network. It is targeted at applications that require a low data
rate, long battery life and secure networking. It has a defined
rate of 250kbit/s, best suited for single signal transmission
from a sensor or input device.
III. SYSTEM IMPLEMENTATION
Figure2: ARM7 (LPC2148) board
C .Finger Print Module:
Fingerprint identification is the oldest method that
has been successfully used in various applications. Each of
our ten fingerprints is different from one another and from
those of every other person. Even identical twins have unique
finger-prints. That makes them ideal for personal
identification. A fingerprint is made of a series of ridges and
furrows on the surface of the finger. The uniqueness of a
fingerprint is determined by the pattern of ridges and furrows
as well as the minutiae points. Minutiae points are local ridge
characteristics that occur when a ridge splits apart or a ridge
ends.
Figure4: Block diagram of entrance section
Figure5: Block diagram of PC section
A. Hardware Architecture
Figure3: fingerprint conversion into digital
D. Zigbee protocol:
In this project we are using Zigbee Technology for
the purpose of wireless communication between fingerprint
sensor module and the PC. This technology was developed
for a wireless personal area networks (PAN), aimed to
control low data rate and low power consumption. In this
technology we can use application of both WI-FI and
Bluetooth. It relies upon IEEE 802.15.4, which has excellent
performance in low SNR environments. It is a specification
for a suite of high level communication protocols.
Using small, low-power digital radios based on an
IEEE 802 standard for personal. Its devices are often used in
ISSN: 2231-5381
A fingerprint scanner, LCD display, Zigbee device
and a Personal Computer will be used as hardware in this
project. Where the finger print scanner scan a finger of a
person and sends its image to the Zigbee device through a
USB connection while the Personal Computer(PC) houses the
database and runs some relevant application to compare and
matching the database fingerprints to the scanned fingerprint.
LCD display will be displaying accurate all database details
information about the relevant person with the help of a
connection to the PC. After matching the database is updated
automatically. This paper operation is done in two modes
Enrolment mode and Verification mode. In enrolment mode
each student should place finger on the surface of the finger
print module and each student image also will be captured
using web cam, all the finger prints and images will be sent
into the data base using zigbee protocol, where all the finger
prints and images are stored along with their details like:
Name, Registration id, etc.
http://www.ijettjournal.org
Page 3886
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013
Second mode is verification, in this mode when student
entering the examination hall this system ask the student to
place the finger on the finger print module and also web
captures the image and send to data base. If the images and
finger prints matches with the data base then the stepper
motor will rotate anti clock wise direction then door will be
open after some delay, the stepper motor will rotate clock
wise direction then door will be closed through ULN2003, if
any finger print(or)image mismatches then the buzzer will
blown.
B. Software Architecture:
In this system we are using software architecture as
Database and Application Program.
Database: The database consists of tables that stores records
implemented in Microsoft SQL Server database. However,
this can be migrated to any other relational database of
choice. SQL Server is fast and easy, it can store a very large
record and requires little configuration.
C. Application Program:
The application program is developed with Microsoft
C# programming language using Microsoft Visual Studio
framework and it provides a user interface for the security
system. The advantages of Microsoft C# programming
language are its robustness, easy to program, has an excellent
database connectivity, runs on the two most common
operating system platforms (Windows and Unix) and it has a
larger user community that provides online support.
IV. RESULTS
A. For Authorized Person
No.
of
Person
Successful
Identification
Unsuccessful
Identification
30
29
01
Accuracy
96.7%
B.For Unauthorized Person
No.
of
Unsuccessful
Person
Successful
Identification
As Defined
05
05
00
Accuracy
Identification
100%
V. CONCLUSION AND FUTURE WORK
This paper is implemented successfully with basic
requirements needed for security of online examination. The
proposed approach uses the technique which combines a
unique biometrics and the concept of wireless communication.
Fingerprint provides a solution for protecting the privacy of
the user; since the user’s true biometric feature is never
changed in the whole life. Fingerprint is used for the better
security and accuracy. This common wireless security system
can be extended in future by using several different types of
required database that will be very hard to break by the
attackers and thus it can provide better security.
REFERENCES
[1]
(2009)
The
Zigbee
Alliance
website
[Online].
Available:
http://www.zigbee.org/
[2] chae, M.J., Yoo, H.S., Kim, J.R., and cho, M.Y., “Bridge condition
Monitoring System using Wireless Network”.
Figure6: Mini 2440
[3] Cirronet, ZMN2405/HP ZigbeeTM Module Developer’s Kit user manual,
Rev A 2007.
This system has been verified to observe the 30
authorized and 05 unauthorized people for entry into the
examination hall. In case of authorized, 30 identification
have been identified successfully and only one identification
didn’t recognize due to their wrong manner of giving
fingerprint and in case of unauthorized person all person
have been successfully denied. Accuracy in both situations is
shown below (Table. 1&2).
ISSN: 2231-5381
[4] D.maltoni, D.manio, A.K Join & S.prabhakar, Hand Book of finger print
recognition, sprinager 2003.
[5] Prabhakar .S., Wang.J., Join, A.K., Pankanti.S., and Bolle, R.minutiae
verification & classification for finger print matching.
[6] Abutaleb and Kamal (1999). Abutaleb A.S. and Kamal M, “A genetic
algorithm for the estimation of ridges in finger prints” IEEE
truncation on image processing, vol.8, no.8, P.1134,1999.
http://www.ijettjournal.org
Page 3887
Download