Professional Documents
Culture Documents
Iris Based Authentication For Online Examination
Iris Based Authentication For Online Examination
ONLINE EXAMINATION
Supervised by
Dr.Menaka Sivakumar
Overview
Introduction
Objectives
System Model
Analysis and Design Modelling
Implementation
Conclusion and Future Scope
Introduction
Digitized Life : Security & Reliability
Drastic transformation in the mode of learning
Remote activities - Education
Challenge – Secured Authentication of candidate in
examinations
Biometric scheme- popularity, secure
Finger print scanning, face recognition- Limitations
Why IRIS?
More Sanitary – No Physical contact required
Matching Accuracy - Unique
Visible Patterns captured from optimized distance
Stability - Patterns are persistent throughout the life
Reliability - Difficult to spoof – Secured from impersonation attacks
Encoding and verification - Faster
Objectives
Aims to verify the candidate in an online examination
Speedy and hassle-free registration for the student.
Random authentication and verification at anytime during online
exams.
Provide accurate and efficient data.
Increase the safety and effectiveness of remote examinations.
System Model
System Process
IRIS Processing
Filtering the
significant features of
the IRIS – Haar
wavelet (binary
coding)
Operating Environment
Platform : Pycharm
?
CREDITS: This presentation template was created by Slidesgo, including icons by
Flaticon, and infographics & images by Freepik
Database Management System
Database Physical Model
IRIS Segementation Techniques
IRIS Feature Extraction Techniques
IRIS Recognition Techniques – A Comparative Study
Feature
Segmentation Accuracy
extraction
Haar
99.97%
Dougman s IDO transform
Gabor Filter 99.94%
Haar
99.93%
Hough transform transform
Gabor Filter 99.91%
Literature
r eS.Nov i e w Author & Year Abstract
1 IRIS system was used for years in many commercial and
government applications that allow access control; this system
.A.A. Ghali, et al.,2017 consists of four main stages which are segmentation,
normalization, feature extraction and matching
2 an iris recognition system captures human eye image the usage of a
near-infrared iris sensor which passes through three steps to be
.S.Kalsoom et al.,2012 converted into an iris template. These three steps are iris
.segmentation, iris normalization, and iris feature encoding
3 The goal was to include biometric rights into the wireless
attendance scheme. The design had the potential to improve work
S Kadry et al.,2013 efficiency and decrease the rate of absenteeism, but it desires a
.huge network bandwidth and a high startup value to enforce it
4 issues that happen when take the iris scan from mobile devices and
G.A. Odinokikh et how it also effect on the quality of image that take like level of
al.,2018 illumination, user wear glasses or lenses or not, the device too far
.or too close