Student Facial Authentication Model based on OpenCV’s Object Detection Method and QR Code for Zambian Higher Institutions of Learning
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 5
Abstract
Facial biometrics captures human facial physiological data, converts it into a data item variable so that this stored variable may be used to provide information security services, such as authentication, integrity management or identification that grants privileged access or control to the owner of that data variable. In this paper, we propose a model for student authentication based on facial biometrics. We recommend a secure model that can be used in the authentication and management of student information in the registration and access of resources, such as bursaries, student accommodation and library facilities at the University of Zambia. Since the model is based on biometrics, a baseline study was carried out to collect data from the general public, government entities, commercial banks, students, ICT regulators and schools on their understanding, use and acceptance of biometrics as an authentication tool. Factor analysis has been used to analyze the findings. The study establishes that performance expectancy, effort expectancy, social influence and user privacy are key determinants for application of a biometric multimode authentication. The study further demonstrates that education and work experience are regulating factors on acceptance and expectancy of a biometric authentication system. Based on these results, we then developed a biometric model that can be used to perform authentication for students in higher learning institutions in Zambia. The results of our proposed model show 66% acceptance rate using OpenCV.
Authors and Affiliations
Lubasi Kakwete Musambo, Jackson Phiri
KNN and ANN-based Recognition of Handwritten Pashto Letters using Zoning Features
This paper presents an intelligent recognition sys-tem for handwritten Pashto letters. However, handwritten char-acter recognition is challenging due to the variations in shape and style. In addition to that, these chara...
Identifying Top-k Most Influential Nodes by using the Topological Diffusion Models in the Complex Networks
Social networks are sub-set of complex networks, where users are defined as nodes, and the connections between users are edges. One of the important issues concerning social network analysis is identifying influential an...
Efficient Relay Selection Scheme based on Fuzzy Logic for Cooperative Communication
The performance of cooperative network can be increased by using relay selection technique. Therefore, interest in relay selection is sloping upward. We proposed two new relay selection schemes based on fuzzy logic for d...
A Features-based Comparative Study of the State-of-the-art Cloud Computing Simulators and Future Directions
Cloud computing has emerged during the last decade and turned out to be an essential component for today’s business. Therefore, many solutions are being proposed to optimize and secure the cloud computing environment. To...
Cloud Server Security using Bio-Cryptography
Data security is becoming more important in cloud computing. Biometrics is a computerized method of identifying a person based on a physiological characteristic. Among the features measured are our face, fingerprints, ha...