Designing an examinee personal verification system using biometric technology

Authors

  • Sethapong Wong-In Science and Technology Department, Valaya Alongkorn Rajabhat University under the Royal Patronage, Phathumthani 13180, Thailand
  • Paniti Netinant College of Digital Innovation and Information Technology (DIIT), Rangsit University, Patumthani 12000, Thailand

Keywords:

biometric technology, examinee personal verification system, IEEE Systems Design--Software Design Descriptions, Software Model Design

Abstract

The examinee personal verification is very important task in every examination.  Although many education institutes have information system to support their task, there is no information system to support the examinee personal verification methodology.  The main problem of examinee personal verification is how to ensure that the examinee is the right person.  This paper presents how to use biometric technology in examinee personal verification by developing the software design model based on IEEE Software Design Descriptions.  The main purpose of this paper is to create the software design model for software developers to use as framework to develop the biometric examinee personal verification system for any education institute.  Our software design model is based on IEEE Standard for Information Technology—Systems Design— Software Design Descriptions (IEEE-SDD) by presenting twelve different viewpoints.

References

Al-hayek, A., Hijazi, F., & Mualiq, J. A. (2016). E- School – School Management System. DSpace University of Palestine. Retrieved September 15, 2017, from. http://dspace.up.edu.ps/xmlui/handle/123456789/209

Al-Maadeed, S., Bourif, M., Bouridane, A., & Jiang, R. (2016). Low-quality facial biometric verification via dictionary-based random pooling. Pattern Recognition, 52(C), 238-248. DOI: 10.1016/j.patcog.2015.09.031

Alzubaidi, A., & Kalita, J. (2016). Authentication of smartphone users using behavioral biometrics. IEEE Communications Surveys & Tutorials, 18(3), 1998-2026. DOI: 10.1109/comst.2016.2537748

Angelov, S., Grefen, P., & Greefhorst, D. (2012). A framework for analysis and design of software reference architectures. Information and Software Technology, 54(4), 417-431. DOI: 10.1016/j.infsof.2011.11.009

Arigbabu, O. A., Ahmad, S. M., Adnan, W. A., & Yussof, S. (2015). Integration of multiple soft biometrics for human identification. Pattern Recognition Letters, 68, 278-287. DOI: 10.1016/j.patrec.2015.07.014

Arjona, R., & Baturone, I. (2012). Model-based design for selecting fingerprint recognition algorithms for embedded systems. 2012 19th IEEE International Conference on Electronics, Circuits, and Systems (ICECS 2012). DOI: 10.1109/icecs.2012.6463556

Bhuvaneswari, T., & Prabaharan, S. (2013). A survey on software development life cycle models. International Journal of Computer Science and Mobile Computing, 2(5), 262-267.

Castella-Roca, J., Herrera-Joancomarti, J., & Dorca-Josa, A. (2006). A secure e-exam management system. First International Conference on Availability, Reliability and Security (ARES06). DOI:10.1109/ares.2006.14.

Fagbola, M., Adigun,A., & Oke, A. (2013). Computer-based test (CBT) system for university academic enterprise examination. International journal of scientific & technology research, 2(8), 336-342.

Fathy, M. E., Patel, V. M., & Chellappa, R. (2015). Face-based Active Authentication on mobile devices. 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 1687-1691. DOI: 10.1109/icassp.2015.7178258

Garg, D., & Sharma, A. K. (2012). Face Recognition, IOSR Journal of Engineering (IOSRJEN), 2(7), 128-133.

Hall, J. G., & Rapanotti, L. (2017). A design theory for software engineering. Information and Software Technology, 87, 46-61. DOI:10.1016/j.infsof.2017.01.010

IEEE Standard for Information Technology--Systems Design--Software Design Descriptions, 1016-2009, (n.d.). DOI: 10.1109/ieeestd.2009.5167255. https://ieeexplore.ieee.org/document/5167255/metrics#metrics

Jain, A. K., Nandakumar, K., & Ross, A. (2016). 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern Recognition Letters, 79, 80-105. DOI: 10.1016/j.patrec.2015.12.013

Lopez-Garcia, M., Ramos-Lara, R., Miguel-Hurtado, O., & Canto-Navarro, E. (2014). Embedded system for biometric online signature verification. IEEE Transactions on Industrial Informatics, 10(1), 491-501. DOI: 10.1109/tii.2013.2269031

Lumini, A., & Nanni, L. (2017). Overview of the combination of biometric matchers. Information Fusion, 33, 71-85. DOI: 10.1016/j.inffus.2016.05.003

Mahfouz, A., Mahmoud, T. M., & Eldin, A. S. (2017). A survey on behavioral biometric authentication on smartphones. Journal of Information Security and Applications, 37, 28-37. DOI: 10.1016/j.jisa.2017.10.002

Majlinda, F., Bekim, F. & Mirlinda, E. (2013). Devising a model of electronic School Management System based on web services for secondary schools in Macedonia. Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces, Cavtat, Croatia 2013, 187-192. DOI: 10.2498/iti.2013.0573

Naz, R., & Khan, M. N. (2015). Rapid Applications Development Techniques: A Critical Review. International Journal of Software Engineering and Its Applications, 9(11), 163-176. DOI:10.14257/ijseia.2015.9.11.15

Netinant, P. (2015). Design adaptability for multilingual mobile application software, Proceeding of the 24th International Conference on Software Engineering and Data Engineering 2015 (pp. 189-193). USA: International Society for Computers and Their Applications ( ISCA ).

Prabhakar, S., Pankanti, S., & Jain, A. (2003). Biometric recognition: security and privacy concerns. IEEE Security & Privacy Magazine, 99(2), 33-42. DOI: 10.1109/msecp.2003.1193209.

Pukdesree, S., & Netinant, P. (2016). Conceptual framework: The adaptive biometrics authentication for accessing cloud computing services using iPhone. Advances in Intelligent Systems and Computing, 463, 209-216.

Sarker, I. H., Faruque, F., Hossen, U., & Rahman, A. (2015). A survey of software development process models in software engineering. International Journal of Software Engineering and Its Applications, 9(11), 55-70. DOI:10.14257/ijseia.2015.9.11.05

Sergis, S., Sholla, I., Zervas, P., & Sampson, D. G. (2014). Supporting school ICT uptake: The ASK School ICT Competence Management System. 2014 International Conference on Interactive Mobile Communication Technologies and Learning (IMCL2014). At: Thessaloniki, Greece. DOI: 10.1109/imctl.2014.7011164

Shah, D., & Haradi, V. (2016). IoT based biometrics implementation on Raspberry Pi. Procedia Computer Science, 79, 328-336. DOI: 10.1016/j.procs.2016.03.043

Shah, M. (2014). Impact of management information systems (MIS) on school administration: What the literature says. Procedia - Social and Behavioral Sciences, 116, 2799-2804. DOI: 10.1016/j.sbspro.2014.01.659

Shahmir, S., Hamidi, F., Bagherzadeh, Z., & Salimi, L. (2011). Role of ICT in the curriculum educational system. Procedia Computer Science, 3, 623-626. DOI: 10.1016/j.procs.2010.12.104

Simin, G., Mojgan, A., Saedah, S., & Kalaivani, S. (2013). ICT Application for Administration and Management: A Conceptual Review. In Procedia - Social and Behavioral Sciences, 103, 1344-1351, ISSN 1877-0428, DOI: 10.1016/j.sbspro.2013.10.705

Singh, S. K., &Tiwari, A. K. (2016). Design and implementation of secure computer based examination system based on B/S structure. International Journal of Applied Engineering Research, Research India Publication, 11(1), 312-318.

Sruthy, S. (2013). Literature Survey on automated person identification techniques. International Journal of Coputer Science and Mobile Computing - IJCSMC, 2(5), 232-237.

Suleiman, A., & Nachandiya1, N. (2018). Computer Based Testing (CBT) System for GST Exams in Adamawa State University, Mubi. Asian Journal of Research in Computer Science, 2(1): 1-11. DOI: 10.9734/AJRCOS/2018/44060

Suman, R., & Kaur, R. (2012). Survey on offline finger print verification system. International Journal of Computer Applications, 48(7), 14-19. DOI: 10.5120/7359-0111

Uddin, M. N., Sharmin, S., Shohel, H. A., Hasan, E., Hossain, S., & Muniruzzaman. (2011). A Survey of Biometrics Security System. IJCSNS International Journal of Computer Science and Network Security, 11(10), 16-23.

Valiallah, O., Seyyed, A., & Razavi, E. (2013). Software Architecture Viewpoint Models: A Short Survey. ACSIJ Advances in Computer Science: an International Journal, 2(5), 55-62.

Vasupongayya, S., Noodam, W., & Kongyong, P. (2013). Developing examination management system: senior capstone project, a case study. World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering 7(7), 1046-1052.

Viola, P., & Jones, M. J. (2004). Robust real-time face detection. International Journal of Computer Vision, 57(2), 137-154. DOI: 10.1023/b:visi.0000013087.49260.fb

Wong-In, S., & Netinant,P. (2016). Software Model Design for Biometric Examinee Personal Verification. The Asian Conference on Society, Education & Technology, 193-202.

Wong-In, S., & Netinant, P. (2017). Proceedings of the 2017 International Conference on Information Technology, 237-242. DOI: 10.1145/3176653.3176678

Downloads

Published

2023-02-18

How to Cite

Sethapong Wong-In, & Paniti Netinant. (2023). Designing an examinee personal verification system using biometric technology. Journal of Current Science and Technology, 8(2), 75–86. Retrieved from https://ph04.tci-thaijo.org/index.php/JCST/article/view/473

Issue

Section

Research Article