Computer Science Project Topics

Development of a Biometric-Based Access Control and Identification System

Development of a Biometric-Based Access Control and Identification System

Development of a Biometric-Based Access Control and Identification System

Chapter One

1.1 AIM AND OBJECTIVES OF THE STUDY

  1. To develop a web service gateway that will enable biometric authentication services through third party applications
  2. To develop a system that will provide biometric services anywhere at any time via internet using the specified devices
  3. To develop a multipurpose API, for client usage on windows application and web ensuring accurate validation.
  4. To create server/client architectural system for verifying and authenticating only valid users using biometric finger print

CHAPTER TWO

LITERATURE REVIEW

INTORDUCTION

THECONCEPT “BIOMETRICS”

Biometrics, automatic methods for identifying a person on the basis of some biological or behavioral characteristic of a person. Many biological characteristics and behavioral characteristics exists and are distinctive to each person. Therefore, biometrics is more reliable and more capable in distinguishing between a specific individual and an impostor than any technique based on an identification (ID) document or a password. The word biometrics comes from the Greek bios (life) and metrikos (measure) (Jain K. 1991). Numerous methods have already been proposed to deal with fingerprint matching and Recognition. Nowadays as organizations search for more secure authentication methods for user access, ecommerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. The results of the overall performance of the developed system have shown that this system can be used effectively for various secure online verification applications.

 

CHAPTER THREE

SYSTEM DESIGN AND METHODOLOGY

 SYSTEM DEVELOPMENT METHODOLOGY

RAD or Rapid application development is a software development methodology developed in response to the different ‘classic waterfall’ development methods. Distinctive for RAD (especially in relation to the waterfall methods) is that it favors speed and flexibility over a detailed upfront planning. An important reason this method was developed had to do with the evolution of the software development industry. Adjustments needed to be made easy and quickly and the RAD method was much more suited for that. The Rapid Application Development (RAD) method was employed for this project to be achieved. RAD process allow usable system to be built with a short time (usually 60 – 90 days). In certain situations, the acceptability of a system can be accessed against the agreed minimum useful requirement other than all requirement.

CHAPTER FOUR

IMPLEMENTATION AND TESTING

This chapter describes and shows how this standalone system is implemented, developed and tested, using the appropriate necessary programming languages, tools and technology.

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

 Summary

This project; a biometric software is developed after reviewing and analyzing the existing manual system at the investigation stage. The design is implemented using PHP, C# and MySQL was used for the database and the Integrated Development Environment (IDE) used was Bracket text editor, Visual Studio 2017 and XAMPP was used as the offline local server. The web application starts with login which contains Admin login, then the Home Page where Admin can click to view the various menus on the Dashboard.

Conclusion

The biometric System based on fingerprint recognition is developed and tested using the appropriate necessary programming languages, tools and technology that fully meets the objectives of the system which has been developed. The system has reached a steady state where all bugs have been eliminated. The system is operated at a high level of efficiency, the admin and persons associated with the system understands its advantage. The system solves the problem it was intended to solve as requirement specification.

Recommendations

As a result of the findings made during the analysis and design stages of this research work, in order to improve the effectiveness of the system to its greater height and full potential, it is recommended that the following features should be added for future expansion of this project.

Admin should be able to generate report for each course

For the effective usage of this system and to have good management of it, it is necessary to provide computer to the various registration/examination centers and staff should be trained to acquire knowledge on how to use the computer and new system to meet global standard and modern challenges of information technology. More importantly, this system should be used in various tertiary institutions to curb examination impersonation.

REFERENCES

  • Alberto Leon-Garcia, Indra Widjaja, (2000), “Communication Networks; Fundamental Concepts and Key Architectures”, McGraw-Hill series in Electrical and Computer Engineering, Boston, U.S.A,
  • Bowman, E. (January, 2000); “Everything You Need to Know About Biometrics,” Second Edition. Identix Corporation
  • Cavoukian B., et al (2008), “The history and development of fingerprinting in Advances in Fingerprint Technology.” In: H.C. LEE and R.E. GAENSSLEN, Florida: CRC Press, pp. 1-38.
  • Crow, B., et al, (September, 1997), “IEEE 802.11 Wireless Local Area Networks”, IEEE Communications Magazine,
  • Diane Z.  (1992);  “Programming  with  Microsoft  Visual  Basic  6.0,”  Course Technology.
  • Erikson, M, (2001). “Fingerprint Biometrics: Address Privacy before Deployment.” Torento: Information and Privacy Commissioner of Ontario.
  • Egbe T. (2003); “Visual Basic 6.0 for Engineers and Scientists,” Joint Heirs publications, Benin City.
  • Frederick P. Brooks (April, 1985); “Silver Bullet: Essence and Accidents of Software Engineering,” PhD thesis, Computer Science Department, Carnegie Mellon University, Technical Report CMU-CS-85-151.
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!