Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/361510046

Image Recognition System for Security in Public Examination

Article · June 2022

CITATIONS READS

0 332

6 authors, including:

Md Babul Hossain Md. Jakaria Zobair


Lecturer Dept. Computer Science and Engineering at German University Banglad… German University Bangladesh
4 PUBLICATIONS 0 CITATIONS 2 PUBLICATIONS 0 CITATIONS

SEE PROFILE SEE PROFILE

Rathindra Nath Mohalder Md. Shahabub Alam


Jessore University of Science and Technology 8 PUBLICATIONS 3 CITATIONS
7 PUBLICATIONS 0 CITATIONS
SEE PROFILE
SEE PROFILE

All content following this page was uploaded by Rafat Ara Shapla on 24 June 2022.

The user has requested enhancement of the downloaded file.


Journal of e-ISSN: 2581-3803
Image Processing and Artificial Intelligence Volume-8, Issue-2 (May-August, 2022)

www.matjournals.com

Image Recognition System for Security in Public Examination


Md. Babul Hossain1*, Md. Jakaria Zobair1, Rathindra Nath Mohalder1, Hussain Al Mortuza2, Md.
Shahabub Alam1, Rafat Ara3, Md. Abdur Rahim3
1
Lecturer, Department of Computer Science and Engineering, German University Bangladesh,
Gazipur, Bangladesh
2
UG Student, Department of Electronics and Communication Engineering, Hajee Mohammad Danesh
Science and Technology University, Dinajpur, Bangladesh
3
Assistant Professor, Department of Computer Science and Engineering, German University
Bangladesh, Gazipur, Bangladesh

*Corresponding Author: babul.hstu@gmail.com

ABSTRACT Flow Diagram (DFD) of this system is


The embodiment of any examinee is an initial provided. The programming instrument used
issue in the public examination method for the front-end development of the system is
known as misconduct. Admit cards and PHP, CSS, and HTML, while structured
Image recognition is naturally applied in the query language and MySQL are used as the
public exam to identify fraudulent candidates. database back end. The purpose of our
Our proposed work is mainly conducted with research work is to provide an automated
bio-informatics and image analysis techniques admission system that saves a lot of time. It
in the recognition, identification, and provides accuracy, reliable identification, and
classification of fraud students. Usually, fraud verification of each student's admission result
students are identified by using face and within higher security.
image analysis since the proposed
architecture is focused on image processing. Keywords- Attendance, Bio-informatics,
In this research work, we build automated Examination, Face recognition, Security
image discovery and recognition to find
fraudulent candidates in the public
examination system. It can detect INTRODUCTION
automatically such functions as data
acquisition, image detection, processing, and Image Recognition System for Security
image matching, and make it provides a in public examination is an off-line test
secure report. This image recognition system simulator to take an off-line examination, which
provides a well-organized way for authorities deals with image analysis techniques and bio-
to manage and track the admission informatics system by identification, recognition
examination system. Face recognition and and classification of the candidate’s document.
detection can further be used in identity Usually, fake students are identified by using
attendance and verification monitoring in the document image analysis. On the other hand, the
public examination system. Our image model is based on image for analysis [1]. Outlier
recognition-based examination system in detection means the problem of finding patterns
Public examination also helps to provide the in data that do not follow to expected normal
quality of examinations in higher education behaviour and in outlier the fraud students are
by making accurate performance assessments identified by balancing the current and
that are valid as well as more motivating and previously submitted image. From a set of
meaningful. In this proposed work, the image different faces, a special face is recognized in the
analysis process is performed with the help of face recognition system. The face has an
binary patterns analysis, which is used to important role for human beings'
convert image data into binary data for communications where each person along with
further processing and analysis. In this his/her feelings mainly is characterized by
research work, it is shown how to Image his/her image of face.
recognition system is developed, and a Data

24 Page 24-30 © MAT Journals 2022. All Rights Reserved


Journal of e-ISSN: 2581-3803
Image Processing and Artificial Intelligence Volume-8, Issue-2 (May-August, 2022)

www.matjournals.com

In our research work, we propose a proposed by K. Swain and M.V.S.V. Prasad in


fancy and efficient Image Recognition System 2015 [6]. In this biometric system, identification
(IRS) where colour feature is used to detect and verification is done for individual student by
faces. After that, we extract facial features based scanning the characteristics of fingerprints. In
on basic features such as edges and structural 2015 O. Awodele and O. Ernest designed and
matching, and then identify the presence or implemented a computerized real time for the
absence of fraud students in the examination NPF [7]. In developing this CRMS, the waterfall
hall. Our system is fully automatic. The model was used. In 2015 A. Gambhir and A. R.
distances between important points are used to Mishra proposed a new technique which
recognize known faces by measuring the provides multilayered security by merging
distance between the eyes or other important cryptography with stenography [8]. In addition,
items or different angles of facial features. K. Krishnamurthi, S. I. Mary and A. Pereira
illustrate fingerprint-based attendance system
OBJECTIVE [9]. The proposed system gives flexibility to
calculate and generate the daily and monthly
The main purpose of this project is to reports of attendance of a student in an MS
establish an error-less digital exam system. The Excel sheet. Sumalatha and K. Sudhakar Reddy
objectives of this project are: proposed a real time embedded finger-vein
• Image Recognition System help to reduce recognition system for authentication of banking
the frantic job of assessing the Bio- system in 2015 [10].
informatics information of an original
candidate. Functional Requirements
• It provides high security.
• It provides high efficiency. It can deal with the functionalities
• Individual information of a candidate can required from the systems which are given
be checked automatically and instantly. below:
• It will help to reduce paperwork to be an • This project will help the institution to lead
integrated examination system. its exams properly.
• The result of the system of a candidate can • Only authorized persons can access the
be shown immediately to the authority. related information.
• It helps to evaluate the result of image • Organizations/Institution can change their
recognition. information as per their requirements.
• The administrator panel will be responsible
Related Works for updating/changing the site.
• The authority can take necessary steps
Anuradha S.G and Kavya B proposed against the processed image.
Automated Face Detection and Recognition for
Detecting fake Candidate in Examination hall DESIGN MATERIALS AND
[1]. Real candidate identification is done based TECHNOLOGIES
on face using LBP mechanism. D. Madhu Babu
and M. Bhagyasri introduced image-based fraud The technologies used to develop this site.
prevention in 2014 [2]. In 2006, W. T. Dong and
Y. S. Soh introduced the image-based fraud Frontend Language
detection technique in Automatic Teller Machine
(ATM) [3]. They proposed a novel and effective • HTML
method to identify such activities by analysing • PHP
the video from the camera which is mounted • CSS
inside ATM. The face recognition methods and • HTTPS
applications were introduced by D. N. Parmar
and B. B. Mehta [4]. H. Walia and N. Jain HTML
proposed fingerprint based attendance system
using Lab VIEW and GSM in 2016 [5]. A new Hyper Text Markup Language (HTML)
security system application for theft control was is a language for sketching web pages. It gives a
introduced by S. Sravanthi and D. Prashanth in build to construct modelled documents adding
2015. The development of an attendance headings, objects, pictures, lists, and several
management system using biometrics was items. It must be conducted to construct

25 Page 24-30 © MAT Journals 2022. All Rights Reserved


Journal of e-ISSN: 2581-3803
Image Processing and Artificial Intelligence Volume-8, Issue-2 (May-August, 2022)

www.matjournals.com

interactive pages. HTML can add or load person which is stored in a binary pattern as a
inscriptions in languages such as PHP, which record. Face recognition systems are typically
adopts the nature of HTML models like employed for security, but they are also being
browsers. used in a growing number of other applications.
The evaluation of face detection using a
PHP computer-based system has changed rapidly.
Several various systems are now being
PHP keeps for Hyper Text Pre-processor developed, and which one is the best depends on
(before defined, the Personal Home Page), is the application domain. Whether to portray the
HTML-studded, server-side scripting the appearance of the face versus the geometry is a
language sketched for web development
major distinction in approaches.
projects. PHP is principally navel on individual
parts scripting, so that, we can do all of the
works where any different CGI program can do, Topology
whereas gather form dataset, produce dynamic
page content with receive and send cookies. The network topology has a pattern and
nodes that are connected to a Local Area
CSS Network (LAN) or any other network through
links such as optical fibre cable or twisted-pair
Cascading Style Sheets (CSS) narrates cable. The network topologies such as Bus
how the HTML components are to be shown on topology, Star topology, Ring topology, Mesh
a paper, screen, or in several media. It is applied topology, Tree topology, and Hybrid topology
to sketch the layout of the website it can monitor which are used in the local area network. The
the layout of many web pages naturally. CSS is Star topology is used to design the Local Area
free from HTML. Network.
HTTPS
IMPLEMENTATION
Hyper Text Transfer Protocol Secure Image Recognition System
(HTTPS) is an oriented or transaction
server/client protocol between a Web Server and The image recognition system is one of
a Web Browser in this project. the best patterns to find illegal students. This
technical-based system is also used to monitor
Backend Devices unauthorized access to participate in the
examination. Our research work has various
• Computers practical applications in the era of biometrics,
• MATLAB software for face recognition access control, smart ID card systems, and
observation systems.
Computers The great diversity and inclusion in this
system is the way facial appearance is proposed
A computer network is one of the for the image recognition system. A major
telecommunications networks in which nodes difference in methods is whether to represent the
are allowed to share their resources. In the
appearance of the face, image, or fingerprint.
computer networks, computing the device's data
interchange with each other conducts data links.
The links among nodes are set up by using a Software Requirements
cable connection. • Face recognition software
• MySQL Server
MATLAB Software for Face Recognition • Xampp Software
• Sublime Text Editor
MATLAB is a programming language
that maybe used to create computer programs. Hardware Requirements
Face Recognition is a computer-based technique • Pentium IV 2.0 and above.
that helps us to find eligible candidates using the
digital photographs procedure. Image • 2 GB RAM
recognition is a biometric method of identifying • 25 GB HDD Space
a person by matching digital image data of a

26 Page 24-30 © MAT Journals 2022. All Rights Reserved


Journal of e-ISSN: 2581-3803
Image Processing and Artificial Intelligence Volume-8, Issue-2 (May-August, 2022)

www.matjournals.com

Admin Diagram 1). The additional responsibilities of the admin


are providing accurate login efficient details for
The functionalities of the admin panel the registered users of the admin portal.
are adding details of each and every student (Fig.

Figure 1: Admin’s diagram for image recognition system.

Student’s Diagram the examination process as well as simple. The


direct beneficiaries of this face recognition
The functionalities of the student are to system are the students. It also reduces the
attend the examination with proper information. exhaustion present in the paper and pen-based
This face recognition system is aimed at make examination system (Fig. 2).

Figure 2: Student’s diagram for image recognition system.

27 Page 24-30 © MAT Journals 2022. All Rights Reserved


Journal of e-ISSN: 2581-3803
Image Processing and Artificial Intelligence Volume-8, Issue-2 (May-August, 2022)

www.matjournals.com

Student Registration Page with Image

This page shows the registration form with image (Fig. 3).

Figure 3: Student registration page with image.

Student’s Login Page with Image

This page shows the process of taking image to the database for verification of real candidate (Fig. 4).

Figure 4: Student login with image.

28 Page 24-30 © MAT Journals 2022. All Rights Reserved


Journal of e-ISSN: 2581-3803
Image Processing and Artificial Intelligence Volume-8, Issue-2 (May-August, 2022)

www.matjournals.com

Recognition of Image from MATLAB Function

This page shows the process of taking image to the database for verification of real candidate
(Fig. 5).

Figure 5: Recognized of image from MATLAB function.

Reasons for using Image Recognition advantages of the Image Recognition System for
based Examination System over Manual Security in Public Examination, examiners, and
Examination System. We have used examinees are dependent on an institution that
Computerized Exam System over Manual provides such a good service and the associated
Examination System because of the following infrastructure.
advantages- Looking into the near future of the
• High security. Image Recognition System, we can expect to
• Time-saving. continue growth in the institute and student
• Ease of handling of data. demand.
• Prohibit cheating in examination.
• Accurate result than manual examination CONSTRAINTS
system.
• Increased efficiency. • In this research work, the user interface is
only in English that is, there is no other
DISCUSSION language option available for the student.
• Candidate can log in only using his
The image Recognition System helps us assigned admission roll and password.
to improve the quality of assessments in higher
education to take any kind of admission. This CONCLUSION
system facilitates the design of valid and
motivating to take examinations. It also The result of this research work will be a
improves reliability and efficiency in scoring. In full-blown working examination system for any
this system, instructive and academic institution. This system also helps the
considerations should be the driving force. As administrations of any institutes to easily
examinations are an important factor for any identify the legal students based on this face
institution, so high security should be taken to recognition, which can provide simplicity,
manipulate them. The use of Image recognition reliability, and other beneficial features to the
systems is rapidly increasing that' why students' user.
performance, improvement, and learning
outcomes are developing. Therefore, the

29 Page 24-30 © MAT Journals 2022. All Rights Reserved


Journal of e-ISSN: 2581-3803
Image Processing and Artificial Intelligence Volume-8, Issue-2 (May-August, 2022)

www.matjournals.com

In future, we will add extra security fingerprint sensor attendance system,


facilities such as Iris recognition, retina International Journal Of Engineering
scanning, and fingerprint. Sciences & Research Technology, 4(7),
139-144, Available at:
REFERENCES http://www.ijesrt.com/issues%20pdf%20fil
e/Archives-2015/July-
1. Anuradha S. G., et al. (2016). Automated 2015/20_ANDROID%20BASED%20FING
face detection & recognition for detecting ERPRINT%20SENSOR%20ATTENDAN
impersonation of candidate in examination CE%20SYSTEM.pdf.
system, International Journal of Scientific 7. Oludele Awodele, et al. (2015). A real-time
& Engineering Research, 7(3), 149-158, crime records management system for
Available at: https://www.ijser.org/research national security agencies, European
paper/Automated-Face-Detection- Journal of Computer Science and
Recognition-for-Detecting-Impersonation- Information Technology, 3(2), 1-12,
of-Candidate-in-Examination-System.pdf. Available at: https://www.eajournals.org/w
2. D. Madhu Babu, et al. (2014). Image-based p-content/uploads/A-Real-Time-Crime-
fraud prevention, International Journal of Records-Management-System-for-National-
Computer Science and Information Security-Agencies.pdf.
Technologies, 5(1), 728-731, Available at: 8. Mahima N, Noor Siddiqa and Tanvir Habib
http://www.ijcsit.com/docs/Volume%205/v Sardar (2019). Multi-layered security
ol5issue01/ijcsit20140501158.pdf. system using cryptography and
3. Wen Tao Dong and Young Sung Soh steganography, International Journal of
(2006). Image-based fraud detection in Innovative Research in Computer Science
automatic teller machine, International & Technology, 7(2), 8-11, Available at:
Journal of Computer Science and Network https://www.ijircst.org/DOC/1_irp658.pdf.
Security, 6(11), 13-18, Available at: 9. Alhothaily M, et al. (2015). Fingerprint
http://paper.ijcsns.org/07_book/200611/200 attendance system for educational institutes,
611A03.pdf. Journal of Science and Technology, 20(1),
4. Divyarajsinh N. Parmar and Brijesh B. 34-44, Available at:
Mehta (2013). Face recognition methods & https://www.researchgate.net/publication/30
applications, International Journal 4216847_Fingerprint_Attendance_System_
Computer Technology & Applications, 4(1), for_Educational_Institutes#:~:text=PDF%2
84-86, Available at: 0Available-
https://arxiv.org/ftp/arxiv/papers/1403/1403 ,Fingerprint%20Attendance%20System%2
.0485.pdf. 0for%20Educational%20Institutes,-
5. Hitesh Walia and Neelu Jain (2016). June%202015Journal.
Fingerprint based attendance system using 10. Rabee E. H. and Abdullah M. N. (2015).
lab view and GSM, International Journal of Hybrid security authentication system using
Innovative Research in Science, finger-vein, International Journal of
Engineering and Technology, 5(7), 12064- Engineering Research & Technology, 9(8),
12072, Available at: http://www.ijirset.com/ 685-688, Available at:
upload/2016/july/8_Fingerprint.pdf. https://www.ijert.org/research/hybrid-
6. Kaliprasanna Swain, M.V.S.V Prasad, and security-framework-based-on-biometrics-
Anwesha Dash (2015). Android based features-IJERTV9IS080184.pdf.

30 Page 24-30 © MAT Journals 2022. All Rights Reserved

View publication stats

You might also like