Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 41

IRIS BASED AUTHENTICATION FOR

ONLINE EXAMINATION

Nour Saeed Baroud Bushra saeed Al-Tafer Arwa Saqer Aalamri


170174874 170231812 170236796

Senior Project – Defence Presentation


15th April, 2021

Supervised by

Dr.Menaka Sivakumar
Overview

 Introduction
 Objectives
 System Model
 Analysis and Design Modelling
 Implementation
 Conclusion and Future Scope
Introduction
 Digitized Life : Security & Reliability
 Drastic transformation in the mode of learning
 Remote activities - Education
 Challenge – Secured Authentication of candidate in
examinations
 Biometric scheme- popularity, secure
 Finger print scanning, face recognition- Limitations
Why IRIS?
 More Sanitary – No Physical contact required
 Matching Accuracy - Unique
 Visible Patterns captured from optimized distance
 Stability - Patterns are persistent throughout the life
 Reliability - Difficult to spoof – Secured from impersonation attacks
 Encoding and verification - Faster
Objectives
 Aims to verify the candidate in an online examination
 Speedy and hassle-free registration for the student.
 Random authentication and verification at anytime during online
exams.
 Provide accurate and efficient data.
 Increase the safety and effectiveness of remote examinations.
System Model
System Process
IRIS Processing

Extract Iris region by


locating the pupil –
Daugman – integro
differential operators
Removing of
occluding features of
the iris

Filtering the
significant features of
the IRIS – Haar
wavelet (binary
coding)
Operating Environment

 Technologies: Python , SQLite.

 Platform : Pycharm

 Database technology : MySQL

 Dataset : (UPOL & IITD).

 The hardware Requirement: Front Camera.


Analysis &
Design Models
USE CASE Model
Data Flow Diagram (DFD)
Activity
diagram
State
diagram
Entity Relationship Diagram
Implementation
Main Interface
Registration Interface
Validating the ID
and Mobile
number
Validating the
Capture of IRIS
image
Login Screen
Admin
Dashboard
Testing
Interface testing Statistics
Overall Project Test Run Statistics
Significant Features

• Sophisticated and flexible authentication during the online


examination system.
• Maximized utilization of the IRIS recognition scheme for E-Learning
mode of education
• Prevention of impersonation threats
• Elimination of password issue – lost / stolen passwords
• Faster verification Process
THANK YOU

?
CREDITS: This presentation template was created by Slidesgo, including icons by
Flaticon, and infographics & images by Freepik
Database Management System
Database Physical Model
IRIS Segementation Techniques
IRIS Feature Extraction Techniques
IRIS Recognition Techniques – A Comparative Study

Feature
Segmentation Accuracy
extraction
Haar
99.97%
Dougman s IDO transform
Gabor Filter 99.94%
Haar
99.93%
Hough transform transform
Gabor Filter 99.91%
Literature
r eS.Nov i e w Author & Year Abstract
1 IRIS system was used for years in many commercial and
government applications that allow access control; this system
.A.A. Ghali, et al.,2017 consists of four main stages which are segmentation,
normalization, feature extraction and matching
2 an iris recognition system captures human eye image the usage of a
near-infrared iris sensor which passes through three steps to be
.S.Kalsoom et al.,2012 converted into an iris template. These three steps are iris
.segmentation, iris normalization, and iris feature encoding
3 The goal was to include biometric rights into the wireless
attendance scheme. The design had the potential to improve work
S Kadry et al.,2013 efficiency and decrease the rate of absenteeism, but it desires a
.huge network bandwidth and a high startup value to enforce it
4 issues that happen when take the iris scan from mobile devices and
G.A. Odinokikh et how it also effect on the quality of image that take like level of
al.,2018 illumination, user wear glasses or lenses or not, the device too far
.or too close

You might also like