Font Size: a A A

Research Of Exam Management Based On Fingerprint Authentication

Posted on:2009-12-04Degree:MasterType:Thesis
Country:ChinaCandidate:J L YanFull Text:PDF
GTID:2178360242491857Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The human fingerprint is unique and distinct in many biological characteristics, human identity authentication base on fingerprints had got many attention. With the social and economic developing, the extensive research of automated fingerprint identification theory and application, it has become more mature, and has become the most effective means, it was more widely applied to various fields. Such as E-commerce, criminal identification, information security.Cheating has always been a major social problem, although the examination of the management staff to make various measures to deal with, but the exam, the cheating also occurred from time to time. Fingerprint recognition will be applied to the examination administration, discriminant their true identity can truly make the ultimate exam fairly and equitably. This paper designed exam management architecture based on fingerprint authentication is on this background, and resolved the key issues.The main points are as follows:1. Firstly, this paper analyzed automated fingerprint identification technology research and application status at home and overseas, also candidates IC card authentication system inadequately based on fingerprint identification technology, and advocated live fingerprint authentication scheme with research based on the background.2. Secondly, elaborated the principle of automated fingerprint recognition including the fingerprint image processing process, including fingerprint image poise, unitary, segmentation, enhancement, numerical value,fracrtion, fingerprint extraction, matching algorithms and Fingerprint Identification System Evaluation indicators.3. Thirdly, designed examination management information system based on fingerprints identification with the hardware and software environments and specific business processes in eeagd. The UML is used as the visual modeling language. The Rational Rose is used as modeling tool. Toad is used as the DB desgining tool. 4. This article researched and analysed the four key issues, fingerprint collection and J2EE client integrated, fingerprint transmission security mechanism on the network, fingerprint-collecting and fingerprint identification algorithm, fingerprint identification and collection equipment.5. Finally, designed all of the modules, integrated system, testing and experiments, analysed the experimental results, the experiment concluded that the article on the examination of fingerprint authentication management applications is feasible, and this can be extended to other programmes Application areas.By the end, This article summarizes the major work and the lack of direction and further study.
Keywords/Search Tags:Automatic Fingerprint Recognition Technology, Exam Management, Fingerprint Matching, Security Mechanism
PDF Full Text Request
Related items