Designing an examinee personal verification system using biometric technology
Keywords:
biometric technology, examinee personal verification system, IEEE Systems Design--Software Design Descriptions, Software Model DesignAbstract
The examinee personal verification is very important task in every examination. Although many education institutes have information system to support their task, there is no information system to support the examinee personal verification methodology. The main problem of examinee personal verification is how to ensure that the examinee is the right person. This paper presents how to use biometric technology in examinee personal verification by developing the software design model based on IEEE Software Design Descriptions. The main purpose of this paper is to create the software design model for software developers to use as framework to develop the biometric examinee personal verification system for any education institute. Our software design model is based on IEEE Standard for Information Technology—Systems Design— Software Design Descriptions (IEEE-SDD) by presenting twelve different viewpoints.
References
Al-hayek, A., Hijazi, F., & Mualiq, J. A. (2016). E- School – School Management System. DSpace University of Palestine. Retrieved September 15, 2017, from. http://dspace.up.edu.ps/xmlui/handle/123456789/209
Al-Maadeed, S., Bourif, M., Bouridane, A., & Jiang, R. (2016). Low-quality facial biometric verification via dictionary-based random pooling. Pattern Recognition, 52(C), 238-248. DOI: 10.1016/j.patcog.2015.09.031
Alzubaidi, A., & Kalita, J. (2016). Authentication of smartphone users using behavioral biometrics. IEEE Communications Surveys & Tutorials, 18(3), 1998-2026. DOI: 10.1109/comst.2016.2537748
Angelov, S., Grefen, P., & Greefhorst, D. (2012). A framework for analysis and design of software reference architectures. Information and Software Technology, 54(4), 417-431. DOI: 10.1016/j.infsof.2011.11.009
Arigbabu, O. A., Ahmad, S. M., Adnan, W. A., & Yussof, S. (2015). Integration of multiple soft biometrics for human identification. Pattern Recognition Letters, 68, 278-287. DOI: 10.1016/j.patrec.2015.07.014
Arjona, R., & Baturone, I. (2012). Model-based design for selecting fingerprint recognition algorithms for embedded systems. 2012 19th IEEE International Conference on Electronics, Circuits, and Systems (ICECS 2012). DOI: 10.1109/icecs.2012.6463556
Bhuvaneswari, T., & Prabaharan, S. (2013). A survey on software development life cycle models. International Journal of Computer Science and Mobile Computing, 2(5), 262-267.
Castella-Roca, J., Herrera-Joancomarti, J., & Dorca-Josa, A. (2006). A secure e-exam management system. First International Conference on Availability, Reliability and Security (ARES06). DOI:10.1109/ares.2006.14.
Fagbola, M., Adigun,A., & Oke, A. (2013). Computer-based test (CBT) system for university academic enterprise examination. International journal of scientific & technology research, 2(8), 336-342.
Fathy, M. E., Patel, V. M., & Chellappa, R. (2015). Face-based Active Authentication on mobile devices. 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 1687-1691. DOI: 10.1109/icassp.2015.7178258
Garg, D., & Sharma, A. K. (2012). Face Recognition, IOSR Journal of Engineering (IOSRJEN), 2(7), 128-133.
Hall, J. G., & Rapanotti, L. (2017). A design theory for software engineering. Information and Software Technology, 87, 46-61. DOI:10.1016/j.infsof.2017.01.010
IEEE Standard for Information Technology--Systems Design--Software Design Descriptions, 1016-2009, (n.d.). DOI: 10.1109/ieeestd.2009.5167255. https://ieeexplore.ieee.org/document/5167255/metrics#metrics
Jain, A. K., Nandakumar, K., & Ross, A. (2016). 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern Recognition Letters, 79, 80-105. DOI: 10.1016/j.patrec.2015.12.013
Lopez-Garcia, M., Ramos-Lara, R., Miguel-Hurtado, O., & Canto-Navarro, E. (2014). Embedded system for biometric online signature verification. IEEE Transactions on Industrial Informatics, 10(1), 491-501. DOI: 10.1109/tii.2013.2269031
Lumini, A., & Nanni, L. (2017). Overview of the combination of biometric matchers. Information Fusion, 33, 71-85. DOI: 10.1016/j.inffus.2016.05.003
Mahfouz, A., Mahmoud, T. M., & Eldin, A. S. (2017). A survey on behavioral biometric authentication on smartphones. Journal of Information Security and Applications, 37, 28-37. DOI: 10.1016/j.jisa.2017.10.002
Majlinda, F., Bekim, F. & Mirlinda, E. (2013). Devising a model of electronic School Management System based on web services for secondary schools in Macedonia. Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces, Cavtat, Croatia 2013, 187-192. DOI: 10.2498/iti.2013.0573
Naz, R., & Khan, M. N. (2015). Rapid Applications Development Techniques: A Critical Review. International Journal of Software Engineering and Its Applications, 9(11), 163-176. DOI:10.14257/ijseia.2015.9.11.15
Netinant, P. (2015). Design adaptability for multilingual mobile application software, Proceeding of the 24th International Conference on Software Engineering and Data Engineering 2015 (pp. 189-193). USA: International Society for Computers and Their Applications ( ISCA ).
Prabhakar, S., Pankanti, S., & Jain, A. (2003). Biometric recognition: security and privacy concerns. IEEE Security & Privacy Magazine, 99(2), 33-42. DOI: 10.1109/msecp.2003.1193209.
Pukdesree, S., & Netinant, P. (2016). Conceptual framework: The adaptive biometrics authentication for accessing cloud computing services using iPhone. Advances in Intelligent Systems and Computing, 463, 209-216.
Sarker, I. H., Faruque, F., Hossen, U., & Rahman, A. (2015). A survey of software development process models in software engineering. International Journal of Software Engineering and Its Applications, 9(11), 55-70. DOI:10.14257/ijseia.2015.9.11.05
Sergis, S., Sholla, I., Zervas, P., & Sampson, D. G. (2014). Supporting school ICT uptake: The ASK School ICT Competence Management System. 2014 International Conference on Interactive Mobile Communication Technologies and Learning (IMCL2014). At: Thessaloniki, Greece. DOI: 10.1109/imctl.2014.7011164
Shah, D., & Haradi, V. (2016). IoT based biometrics implementation on Raspberry Pi. Procedia Computer Science, 79, 328-336. DOI: 10.1016/j.procs.2016.03.043
Shah, M. (2014). Impact of management information systems (MIS) on school administration: What the literature says. Procedia - Social and Behavioral Sciences, 116, 2799-2804. DOI: 10.1016/j.sbspro.2014.01.659
Shahmir, S., Hamidi, F., Bagherzadeh, Z., & Salimi, L. (2011). Role of ICT in the curriculum educational system. Procedia Computer Science, 3, 623-626. DOI: 10.1016/j.procs.2010.12.104
Simin, G., Mojgan, A., Saedah, S., & Kalaivani, S. (2013). ICT Application for Administration and Management: A Conceptual Review. In Procedia - Social and Behavioral Sciences, 103, 1344-1351, ISSN 1877-0428, DOI: 10.1016/j.sbspro.2013.10.705
Singh, S. K., &Tiwari, A. K. (2016). Design and implementation of secure computer based examination system based on B/S structure. International Journal of Applied Engineering Research, Research India Publication, 11(1), 312-318.
Sruthy, S. (2013). Literature Survey on automated person identification techniques. International Journal of Coputer Science and Mobile Computing - IJCSMC, 2(5), 232-237.
Suleiman, A., & Nachandiya1, N. (2018). Computer Based Testing (CBT) System for GST Exams in Adamawa State University, Mubi. Asian Journal of Research in Computer Science, 2(1): 1-11. DOI: 10.9734/AJRCOS/2018/44060
Suman, R., & Kaur, R. (2012). Survey on offline finger print verification system. International Journal of Computer Applications, 48(7), 14-19. DOI: 10.5120/7359-0111
Uddin, M. N., Sharmin, S., Shohel, H. A., Hasan, E., Hossain, S., & Muniruzzaman. (2011). A Survey of Biometrics Security System. IJCSNS International Journal of Computer Science and Network Security, 11(10), 16-23.
Valiallah, O., Seyyed, A., & Razavi, E. (2013). Software Architecture Viewpoint Models: A Short Survey. ACSIJ Advances in Computer Science: an International Journal, 2(5), 55-62.
Vasupongayya, S., Noodam, W., & Kongyong, P. (2013). Developing examination management system: senior capstone project, a case study. World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering 7(7), 1046-1052.
Viola, P., & Jones, M. J. (2004). Robust real-time face detection. International Journal of Computer Vision, 57(2), 137-154. DOI: 10.1023/b:visi.0000013087.49260.fb
Wong-In, S., & Netinant,P. (2016). Software Model Design for Biometric Examinee Personal Verification. The Asian Conference on Society, Education & Technology, 193-202.
Wong-In, S., & Netinant, P. (2017). Proceedings of the 2017 International Conference on Information Technology, 237-242. DOI: 10.1145/3176653.3176678
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.