SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2356
Examination Forgery Avoidance System Using Image Processing
and IoT
Muthu Icourt Maharaja A1, Karuppaiah S2, Lingatharan A3, Veerasamy B4
1,2,3UG Scholar, Hindusthan College of Engineering & Technology, Coimbatore
4Associate Professor, Dept. of Electronics & Communication Engineering, Hindusthan College of
Engineering & Technology, Coimbatore, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - According to the improvementofthetechnology,
a new system based on encryption has beenfound. Thisproject
has been used encrypted data sharing has been used in
education. To develop a secured examination system helps to
detect a wide variety of cheating behaviors during the
examination session. The forgery of examination becomes
familiar and this made a lot of problems and difficulties to the
official institutions. Image processing techniquesfor detection
forgery in the examination. Inthisproject, theproposedmodel
for a secured examination system uses user verification to
detect cheating behaviors during an exam, using biometric
recognition and RF-ID verification. Any mismatch when
compared with dataset then send alert (captured image and
candidate details) to management. The project aims todesign
a quick and most efficient system for detecting forgery in
official examination
Key Words: Proxy, Raspberry pi, Fingerprint Module,
Camera, PIR Sensor
1.INTRODUCTION
Our Project titled "Examination Forgery Avoidance
System using image Processing and IoT” has been
undertaken to avoid proxy in the examination. In this
competitive world, everyone shows their knowledge and
skills are depending only through examinations. So,
everywhere conductexamsforfilteringcandidateswhohave
good knowledge compared to one another. There is no
system for checking whether the legal student writing the
examination or not. Nowadays most of the students are
allowing other persons to write their exams in the
government exams as well as private institution exams. Due
to this, government posts and college seats are going to the
ineligible persons. So, we are proposing a paper to monitor
students who are writing the government exams and
entrance exams. In this project, we can reduce the proxy in
the examination.
2. EXISTING SYSTEM
In the existing system, they detecttheproxythrough
the handwriting of the candidate and verify the candidate
through the barcode of the application form. So, a
knowledgeable person gets affected. This is not working in
the real-time examination.
2.1 Drawback
 Handwriting can be written by anyone
 Existing system is not more reliable
 Most of the people easily do proxy
 Difficult to find the authorized person
3. PROPOSED SYSTEM
In the proposed system, we are overcoming the
drawbacks of the existingsystem.Hereweareusingacamera
to capture the candidate face and biometric sensor to fetch
the candidatedetails and thedetailswillbesenttoRaspberry
pi for verification. If the candidate image is verified as
unauthorized, then an alarm will be activated and also the
alert message will send to themanagement throughthemail.
After the verification done successfully then, the door will
open, the authorizedcandidateallowedtowritetheexamand
candidate data store in the cloud. Every status will be
displayed in LCD.
4. BLOCK DIAGRAM
Fig -1: Block diagram of Proposed System
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2357
5. HARDWARE DESCRIPTION
5.1 Raspberry Pi 3
Fig -2: Raspberry Pi 3
The Raspberry Pi3isthethirdgenerationRaspberry
Pi. This powerful credit-card-sized single-board computer
can be used for many applications. This is 10x faster than the
first-generation Raspberry Pi. This Raspberry Pi has GPIO
pins, USB slot, HDMI Port, Ethernet Port, and Micro SD card
slot.
Each column has 20 pins total of 40 GPIO pins. It has
a 64-bit CPU Quad-Core ARMCortex-A53processorwith1GB
of RAM which works at 1.2 GHz. Micro USB slot used to
connect the power supply.IthasfourUSBports.TheEthernet
port is used to connect the network connectivity. This pi 3
has the inbuilt Bluetooth and wi-fi connectivity. To connect
the projector or monitororTvusingHDMIportandtheHDMI
to VGA converter used to connecttotheprojector.Wecanuse
the SD card forloading the operatingsystemforit.Weusethe
smartphone charger for providing the power supply.
Operating System for the Raspberry Pi is Raspbian.
This free operating system is known as the modified version
of the popular OS Debian. It promotes python and scratch as
the main programming languages, with support for many
other languages. We can use Python language for
programming in Raspberry pi. Python is a wonderful and
powerful programming language that’s easy to use.
5.2 Fingerprint Module
Fig -3: Fingerprint Module R307
R307 fingerprint moduleis afingerprintsensorwith
a transistor-transistorlogicinterface.Thefingerprintmodule
can directly interfacewith3.3or5v Microcontroller.Theuser
can store the fingerprint data in the module and can
configure it in 1:1 or 1: N mode for identifying the person.
Fingerprint Module consists of high-speed DSP
processor, high-performance fingerprint alignment
algorithm, high-capacity FLASH chips, and other hardware
and software composition, stable performance, simple
structure, with fingerprint entry, image processing,
fingerprint matching, search and templatestorage,andother
functions.
5.3 Webcam
Fig -4: Webcam
A camera records andstoresphotographicimagesin
digital form. Many current models are also able to capture
sound or video, in addition to still images. Capture is usually
accomplished by the use of a photosensor, using a charged
coupled device.
An image sensor is an electronic, photosensitive
device that converts an optical image into an electronic
signal. This light detector is one of two types, eithera charge-
coupled device (CCD) or a CMOS image sensor. In a camera,
light from the thing you are photographing zooms into the
camera lens. This incoming "picture" hits the image sensor
chip, which breaks it up into millions of pixels. The sensor
measures the color and brightness of each pixel and stores it
as a number. Here we use a normal USB web camera to
capture the candidate image and store it as a digital image.
5.4 PIR Sensor
Passive Infrared sensors (PIRs) are electronic
devices that are used in some security alarm systems to
detect motion of an infrared emitting source, usually a
human body. PIR is made of a pyroelectric sensor, which can
detect different levels of infrared radiation. Itworksentirely
by detecting the IR radiation emitted by the objects.
Outdoor passive infrared: The detection distance
ranges from 10 meters to 150 meters. When the sensor is
idle, both slots detect the same amount of IR, the ambient
amount radiated from the room or walls or outdoors. When
a warm body like a human or animal passes by, it first
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2358
intercepts one half of the PIR sensor, whichcausesa positive
differential change between the two halves.
Fig -5: PIR Sensor
Window made of IR transmissive material that
protects the sensing element. This sensor has three pins.
They are Drain/VCC, Source/Out,Ground.Usually,itusesthe
power is 3v to 5v DC input but maybe high as 12 v. The
output digital pulse is 3.3v when it is triggered. The output
digital pulse is 0v when it is idle. Indoor passive infrared
detection distances range from 25 cm to 20 m. It has low
power consumption of 65mA andtheoperatingtemperature
is -20o to 80oC.
5.5 Liquid-Crystal Display
Fig -6: Liquid-Crystal Display
LCD (Liquid Crystal Display) screen is an electronic
display module and find a wide range of applications. A 16x2
LCD is a very basic module and is very commonly used in
various devices and circuits. These modules are preferred
over seven segments and other multi segment LEDs.
A 16x2 LCD means it can display 16 characters per
line and there are 2 such lines. In this LCD each character is
displayed in the 5x7 pixel matrix. This LCD has two registers,
namely, Command and Data. The command register stores
the command instructions given to the LCD.Acommandisan
instruction given to LCD to do a predefined task like
initializing it, clearing its screen, setting the cursor position,
controlling display, etc. The data registerstoresthedatatobe
displayed on the LCD and brightness can be adjusted by
external potentiometer.
6. METHODOLOGY
The step-by-step procedure of the proposed system.
 Capture the candidate face by camera
 Use Image Restoration convert it into grayscale
image
 Scan the fingerprint of candidate
 Matching with dataset values
 Every status display using LCD
 Verification done successfully the doorwillopen
then allow to attend examination
 If any mismatch, send alert to management,
trigger alarm and door remains closed
6.1 Camera
Use of camera, we can capture the candidate and
detect their face by using the Haar Cascade Classifier
algorithm with defining the height and width of the image.
6.2 Image Restoration
Image restoration is an area that also deals with
improving the appearance of an image. However, unlike
enhancement, which is subjective, image restoration is
objective, in the sense that restoration techniques tend to be
based on mathematical or probabilistic models of image
degradation.
Fig -7: Image Restoration
6.3 Fingerprints
Fingerprints are one of many forms of biometrics
used to identify an individual and verify their identity. The
analysis of fingerprints for matching purposes generally
requires the comparison of several features of the print
pattern. These include patterns, which are aggregate
characteristics of ridges, and minutia points, which are
unique features found within the patterns.
The three basicpatternsoffingerprint ridgesarethe
arch, loop, and whorl.
Arch Pattern - An arch is a pattern where the ridges enter
from one side of the finger, rise in the center forming an arc,
and then exit the other side of the finger.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2359
Loop Pattern - The loop is a pattern where the ridges enter
from one side of a finger, form a curve, and tend to exit from
the same side they enter.
Whorl Pattern - In the whorl pattern, ridges form circularly
around a central point on the finger.
Fig -8: Fingerprint Patterns
6.4 Dataset
Store the candidate's image in the dataset on the
registration of the examination. Later on, use OpenCV to
perform face recognition on a dataset of our faces beforethe
examination. Examples of images in the dataset, here 30
photos but we can take n number of candidate photos to
improve matching efficiency.
Fig -9: Images in Dataset
6.5 Servomotor
Here we use servomotor for opening and closing a
door depends on the candidate verification process. If
verification is done successfully then the door will open.
Otherwise, the door remains closed.
7. CONCLUSIONS
The proposed system used PIR sensor. If any object
motion is there it helps to turn on the camera to capture the
candidate image and compare it with the existing images in
datasets. If the image matched then checks the biometric
data by using the fingerprint moduleandthentheauthorized
to attend the examination. If any mismatch in the image and
the biometric data an alert mail will sendtothemanagement
that includes captured image and the candidate details. It is
help to reduce the proxy in the examination. This system is
more reliable and easier to find an unauthorized person.
REFERENCES
[1] Sheng Liand, Xinpeng Zhang, “Toward Construction-
Based Data Hiding: From SecretstoFingerprintImages”,
IEEE Transaction on Image Processing, vol. 28, NO. 3,
March 2019.
[2] Yong Yew Yeap, U. U. Sheikh, and Ab Al-Hadi Ab
Rahman, “Image Forensic for Digital Image Copy Move
Forgery Detection”, ICSPA 2018, 9 -10 March 2018.
[3] Sanjay Thakre, Ambikesh Kumar Gupta and Shilpi
Sharma, “Secure Reliable Multimodel Biometric
Fingerprint and Face Recognition”, ICCCI -2017),Jan.05
– 07, 2017.
[4] R. Kaur and A. Kaur, “Copy-Move Forgery Detection
Using ORB and SIFT Detector,” vol. 4, no. 4, pp.804–813,
2016.
[5] M. F. Hashmi, V. Anand, and A. G. Keskar, “A copymove
image forgery detection based on speeded up robust
feature transform and wavelet transforms,” Proc.- 5th
IEEE Int. Conf. Comput. Commun. Technol. ICCCT 2015.
[6] Gaganpreet Kaur, Dheerendra Singh, Sukhpreet Kaur,
“Pollination Based Optimization for Feature Reduction
at Feature Level Speech & Signature Biometrics”,
ICRITO, AIIT, Amity University Uttar Pradesh, Noida,
India, 8-10-2014.
[7] Dapinder Kaur, Gaganpreet Kaur, Dheerendra Singh,
“Efficient and Robust Multimodal Biometric System for
Feature Level Fusion (Speech and Signature)”, IJCA
(0975 – 8887) Volume 75– No.5, August 2013.
[8] H. He, X. Huang, and K. Jun, “Exposing copy-move
forgeries based on a dimension-reduced SIFT method,”
Information Technology Journal, vol. 12, no. 14. pp.
2975–2979, 2013.
[9] Z. Mohamadian and A. A. Pouyan, “Detection of
duplication forgeryindigital imagesinuniformandnon-
uniform regions,” Proc. - UKSim 15th Int. Conf. Comput.
Model. Simulation, UKSim 2013, vol. 1, pp. 455–460,
2013.
[10] Shweta Gaur, V.A.Shah, Manish Thakker, “Biometric
Recognition Techniques: A Review”, IJARE, Vol. 1, Issue
4, October 2012.
[11] R. Babaei, O. Molalapata, and A. A. Pandor, Face
Recognition Application for Automatic Teller Machines
(ATM), in ICIKM, 3rd ed. vol.45, pp.211-216, 2012.

More Related Content

What's hot

IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voiceeSAT Publishing House
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET Journal
 
IRJET- Collision Avoidance based on Obstacle Detection using OpenCV
IRJET-  	  Collision Avoidance based on Obstacle Detection using OpenCVIRJET-  	  Collision Avoidance based on Obstacle Detection using OpenCV
IRJET- Collision Avoidance based on Obstacle Detection using OpenCVIRJET Journal
 
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring SystemIRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring SystemIRJET Journal
 
IRJET- VI Spectacle – A Visual Aid for the Visually Impaired
IRJET- VI Spectacle – A Visual Aid for the Visually ImpairedIRJET- VI Spectacle – A Visual Aid for the Visually Impaired
IRJET- VI Spectacle – A Visual Aid for the Visually ImpairedIRJET Journal
 
IRJET- Low Cost IoT based Remote Health Monitoring System
IRJET-  	  Low Cost IoT based Remote Health Monitoring SystemIRJET-  	  Low Cost IoT based Remote Health Monitoring System
IRJET- Low Cost IoT based Remote Health Monitoring SystemIRJET Journal
 
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
IRJET- Safe and Secure Smart Electronic Voting Machine using BiometricIRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
IRJET- Safe and Secure Smart Electronic Voting Machine using BiometricIRJET Journal
 
Iot attendance system using fingerprint module
Iot attendance system using fingerprint module Iot attendance system using fingerprint module
Iot attendance system using fingerprint module AjinkyaMore29
 
IRJET - Biometric based Medical Record System
IRJET -  	  Biometric based Medical Record SystemIRJET -  	  Biometric based Medical Record System
IRJET - Biometric based Medical Record SystemIRJET Journal
 
IRJET - Efficient Approach for Number Plaque Accreditation System using W...
IRJET -  	  Efficient Approach for Number Plaque Accreditation System using W...IRJET -  	  Efficient Approach for Number Plaque Accreditation System using W...
IRJET - Efficient Approach for Number Plaque Accreditation System using W...IRJET Journal
 
IRJET - A Cyber-Physical System for Environmental Monitoring Based on IOT
IRJET -  	  A Cyber-Physical System for Environmental Monitoring Based on IOTIRJET -  	  A Cyber-Physical System for Environmental Monitoring Based on IOT
IRJET - A Cyber-Physical System for Environmental Monitoring Based on IOTIRJET Journal
 
IRJET - Design of Student Security System using RFID Mechanism
IRJET -  	  Design of Student Security System using RFID MechanismIRJET -  	  Design of Student Security System using RFID Mechanism
IRJET - Design of Student Security System using RFID MechanismIRJET Journal
 
IRJET- A Survey on Advanced Ration Distribution System
IRJET-  	  A Survey on Advanced Ration Distribution SystemIRJET-  	  A Survey on Advanced Ration Distribution System
IRJET- A Survey on Advanced Ration Distribution SystemIRJET Journal
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 

What's hot (20)

IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
 
IRJET- Collision Avoidance based on Obstacle Detection using OpenCV
IRJET-  	  Collision Avoidance based on Obstacle Detection using OpenCVIRJET-  	  Collision Avoidance based on Obstacle Detection using OpenCV
IRJET- Collision Avoidance based on Obstacle Detection using OpenCV
 
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring SystemIRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
 
IRJET- VI Spectacle – A Visual Aid for the Visually Impaired
IRJET- VI Spectacle – A Visual Aid for the Visually ImpairedIRJET- VI Spectacle – A Visual Aid for the Visually Impaired
IRJET- VI Spectacle – A Visual Aid for the Visually Impaired
 
IRJET- Low Cost IoT based Remote Health Monitoring System
IRJET-  	  Low Cost IoT based Remote Health Monitoring SystemIRJET-  	  Low Cost IoT based Remote Health Monitoring System
IRJET- Low Cost IoT based Remote Health Monitoring System
 
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
IRJET- Safe and Secure Smart Electronic Voting Machine using BiometricIRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
 
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
 
Iot attendance system using fingerprint module
Iot attendance system using fingerprint module Iot attendance system using fingerprint module
Iot attendance system using fingerprint module
 
IRJET - Biometric based Medical Record System
IRJET -  	  Biometric based Medical Record SystemIRJET -  	  Biometric based Medical Record System
IRJET - Biometric based Medical Record System
 
IRJET - Efficient Approach for Number Plaque Accreditation System using W...
IRJET -  	  Efficient Approach for Number Plaque Accreditation System using W...IRJET -  	  Efficient Approach for Number Plaque Accreditation System using W...
IRJET - Efficient Approach for Number Plaque Accreditation System using W...
 
[IJET V2I3P6] Authors: Ajeeth, Sandhya raani M
[IJET V2I3P6] Authors:  Ajeeth, Sandhya raani M[IJET V2I3P6] Authors:  Ajeeth, Sandhya raani M
[IJET V2I3P6] Authors: Ajeeth, Sandhya raani M
 
SMART APP FOR PHYSICALLY CHALLENGED PEOPLE USING INTERNET OF THINGS
SMART APP FOR PHYSICALLY CHALLENGED  PEOPLE USING INTERNET OF THINGSSMART APP FOR PHYSICALLY CHALLENGED  PEOPLE USING INTERNET OF THINGS
SMART APP FOR PHYSICALLY CHALLENGED PEOPLE USING INTERNET OF THINGS
 
IRJET - A Cyber-Physical System for Environmental Monitoring Based on IOT
IRJET -  	  A Cyber-Physical System for Environmental Monitoring Based on IOTIRJET -  	  A Cyber-Physical System for Environmental Monitoring Based on IOT
IRJET - A Cyber-Physical System for Environmental Monitoring Based on IOT
 
IRJET - Design of Student Security System using RFID Mechanism
IRJET -  	  Design of Student Security System using RFID MechanismIRJET -  	  Design of Student Security System using RFID Mechanism
IRJET - Design of Student Security System using RFID Mechanism
 
IRJET- A Survey on Advanced Ration Distribution System
IRJET-  	  A Survey on Advanced Ration Distribution SystemIRJET-  	  A Survey on Advanced Ration Distribution System
IRJET- A Survey on Advanced Ration Distribution System
 
S0102297102
S0102297102S0102297102
S0102297102
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 

Similar to IRJET - Examination Forgery Avoidance System using Image Processing and IoT

Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemIRJET Journal
 
IRJET- Vehicle Accident Prevention System
IRJET-  	  Vehicle Accident Prevention SystemIRJET-  	  Vehicle Accident Prevention System
IRJET- Vehicle Accident Prevention SystemIRJET Journal
 
IRJET- IoT Based E-Challan Automation for RTO using RFID
IRJET-  	  IoT Based E-Challan Automation for RTO using RFIDIRJET-  	  IoT Based E-Challan Automation for RTO using RFID
IRJET- IoT Based E-Challan Automation for RTO using RFIDIRJET Journal
 
IRJET - Floor Cleaning Robot with Vision
IRJET - Floor Cleaning Robot with VisionIRJET - Floor Cleaning Robot with Vision
IRJET - Floor Cleaning Robot with VisionIRJET Journal
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET Journal
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasIRJET Journal
 
Ladies Compartment Intruder Alert
Ladies Compartment Intruder AlertLadies Compartment Intruder Alert
Ladies Compartment Intruder AlertIRJET Journal
 
IRJET- Animal Identification in Roads and Alert System for Passengers usi...
IRJET-  	  Animal Identification in Roads and Alert System for Passengers usi...IRJET-  	  Animal Identification in Roads and Alert System for Passengers usi...
IRJET- Animal Identification in Roads and Alert System for Passengers usi...IRJET Journal
 
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSORAUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSORIRJET Journal
 
IRJET- Smart Machine System for Virtually Impaired People
IRJET-  	  Smart Machine System for Virtually Impaired PeopleIRJET-  	  Smart Machine System for Virtually Impaired People
IRJET- Smart Machine System for Virtually Impaired PeopleIRJET Journal
 
IRJET - Military Spy Robot with Intelligentdestruction
IRJET - Military Spy Robot with IntelligentdestructionIRJET - Military Spy Robot with Intelligentdestruction
IRJET - Military Spy Robot with IntelligentdestructionIRJET Journal
 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...IRJET Journal
 
Detection of Zebra Crossing Violation by Automotive using IoT automation
Detection of Zebra Crossing Violation by Automotive using IoT automationDetection of Zebra Crossing Violation by Automotive using IoT automation
Detection of Zebra Crossing Violation by Automotive using IoT automationIRJET Journal
 
IRJET- Smart Security System for Vehicles
IRJET- Smart Security System for VehiclesIRJET- Smart Security System for Vehicles
IRJET- Smart Security System for VehiclesIRJET Journal
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
Design and Analysis of Ignition based on RFID by Arduino Nano CompilerDesign and Analysis of Ignition based on RFID by Arduino Nano Compiler
Design and Analysis of Ignition based on RFID by Arduino Nano CompilerIRJET Journal
 
IRJET- Automatic Gate Control and Parking System using AVR Controller
IRJET- Automatic Gate Control and Parking System using AVR ControllerIRJET- Automatic Gate Control and Parking System using AVR Controller
IRJET- Automatic Gate Control and Parking System using AVR ControllerIRJET Journal
 
IRJET - Compactness based Traffic Signal Monitoring System
IRJET - Compactness based Traffic Signal Monitoring SystemIRJET - Compactness based Traffic Signal Monitoring System
IRJET - Compactness based Traffic Signal Monitoring SystemIRJET Journal
 
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET Journal
 
IRJET- Building Monitoring using Wireless System
IRJET- Building Monitoring using Wireless SystemIRJET- Building Monitoring using Wireless System
IRJET- Building Monitoring using Wireless SystemIRJET Journal
 

Similar to IRJET - Examination Forgery Avoidance System using Image Processing and IoT (20)

Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
IRJET- Vehicle Accident Prevention System
IRJET-  	  Vehicle Accident Prevention SystemIRJET-  	  Vehicle Accident Prevention System
IRJET- Vehicle Accident Prevention System
 
IRJET- IoT Based E-Challan Automation for RTO using RFID
IRJET-  	  IoT Based E-Challan Automation for RTO using RFIDIRJET-  	  IoT Based E-Challan Automation for RTO using RFID
IRJET- IoT Based E-Challan Automation for RTO using RFID
 
IRJET - Floor Cleaning Robot with Vision
IRJET - Floor Cleaning Robot with VisionIRJET - Floor Cleaning Robot with Vision
IRJET - Floor Cleaning Robot with Vision
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
 
Ladies Compartment Intruder Alert
Ladies Compartment Intruder AlertLadies Compartment Intruder Alert
Ladies Compartment Intruder Alert
 
IRJET- Animal Identification in Roads and Alert System for Passengers usi...
IRJET-  	  Animal Identification in Roads and Alert System for Passengers usi...IRJET-  	  Animal Identification in Roads and Alert System for Passengers usi...
IRJET- Animal Identification in Roads and Alert System for Passengers usi...
 
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSORAUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
 
IRJET- Smart Machine System for Virtually Impaired People
IRJET-  	  Smart Machine System for Virtually Impaired PeopleIRJET-  	  Smart Machine System for Virtually Impaired People
IRJET- Smart Machine System for Virtually Impaired People
 
IRJET - Military Spy Robot with Intelligentdestruction
IRJET - Military Spy Robot with IntelligentdestructionIRJET - Military Spy Robot with Intelligentdestruction
IRJET - Military Spy Robot with Intelligentdestruction
 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
 
Detection of Zebra Crossing Violation by Automotive using IoT automation
Detection of Zebra Crossing Violation by Automotive using IoT automationDetection of Zebra Crossing Violation by Automotive using IoT automation
Detection of Zebra Crossing Violation by Automotive using IoT automation
 
IRJET- Smart Security System for Vehicles
IRJET- Smart Security System for VehiclesIRJET- Smart Security System for Vehicles
IRJET- Smart Security System for Vehicles
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
Design and Analysis of Ignition based on RFID by Arduino Nano CompilerDesign and Analysis of Ignition based on RFID by Arduino Nano Compiler
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
 
IRJET- Automatic Gate Control and Parking System using AVR Controller
IRJET- Automatic Gate Control and Parking System using AVR ControllerIRJET- Automatic Gate Control and Parking System using AVR Controller
IRJET- Automatic Gate Control and Parking System using AVR Controller
 
IRJET - Compactness based Traffic Signal Monitoring System
IRJET - Compactness based Traffic Signal Monitoring SystemIRJET - Compactness based Traffic Signal Monitoring System
IRJET - Compactness based Traffic Signal Monitoring System
 
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
 
IRJET- Building Monitoring using Wireless System
IRJET- Building Monitoring using Wireless SystemIRJET- Building Monitoring using Wireless System
IRJET- Building Monitoring using Wireless System
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 

Recently uploaded (20)

pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 

IRJET - Examination Forgery Avoidance System using Image Processing and IoT

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2356 Examination Forgery Avoidance System Using Image Processing and IoT Muthu Icourt Maharaja A1, Karuppaiah S2, Lingatharan A3, Veerasamy B4 1,2,3UG Scholar, Hindusthan College of Engineering & Technology, Coimbatore 4Associate Professor, Dept. of Electronics & Communication Engineering, Hindusthan College of Engineering & Technology, Coimbatore, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - According to the improvementofthetechnology, a new system based on encryption has beenfound. Thisproject has been used encrypted data sharing has been used in education. To develop a secured examination system helps to detect a wide variety of cheating behaviors during the examination session. The forgery of examination becomes familiar and this made a lot of problems and difficulties to the official institutions. Image processing techniquesfor detection forgery in the examination. Inthisproject, theproposedmodel for a secured examination system uses user verification to detect cheating behaviors during an exam, using biometric recognition and RF-ID verification. Any mismatch when compared with dataset then send alert (captured image and candidate details) to management. The project aims todesign a quick and most efficient system for detecting forgery in official examination Key Words: Proxy, Raspberry pi, Fingerprint Module, Camera, PIR Sensor 1.INTRODUCTION Our Project titled "Examination Forgery Avoidance System using image Processing and IoT” has been undertaken to avoid proxy in the examination. In this competitive world, everyone shows their knowledge and skills are depending only through examinations. So, everywhere conductexamsforfilteringcandidateswhohave good knowledge compared to one another. There is no system for checking whether the legal student writing the examination or not. Nowadays most of the students are allowing other persons to write their exams in the government exams as well as private institution exams. Due to this, government posts and college seats are going to the ineligible persons. So, we are proposing a paper to monitor students who are writing the government exams and entrance exams. In this project, we can reduce the proxy in the examination. 2. EXISTING SYSTEM In the existing system, they detecttheproxythrough the handwriting of the candidate and verify the candidate through the barcode of the application form. So, a knowledgeable person gets affected. This is not working in the real-time examination. 2.1 Drawback  Handwriting can be written by anyone  Existing system is not more reliable  Most of the people easily do proxy  Difficult to find the authorized person 3. PROPOSED SYSTEM In the proposed system, we are overcoming the drawbacks of the existingsystem.Hereweareusingacamera to capture the candidate face and biometric sensor to fetch the candidatedetails and thedetailswillbesenttoRaspberry pi for verification. If the candidate image is verified as unauthorized, then an alarm will be activated and also the alert message will send to themanagement throughthemail. After the verification done successfully then, the door will open, the authorizedcandidateallowedtowritetheexamand candidate data store in the cloud. Every status will be displayed in LCD. 4. BLOCK DIAGRAM Fig -1: Block diagram of Proposed System
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2357 5. HARDWARE DESCRIPTION 5.1 Raspberry Pi 3 Fig -2: Raspberry Pi 3 The Raspberry Pi3isthethirdgenerationRaspberry Pi. This powerful credit-card-sized single-board computer can be used for many applications. This is 10x faster than the first-generation Raspberry Pi. This Raspberry Pi has GPIO pins, USB slot, HDMI Port, Ethernet Port, and Micro SD card slot. Each column has 20 pins total of 40 GPIO pins. It has a 64-bit CPU Quad-Core ARMCortex-A53processorwith1GB of RAM which works at 1.2 GHz. Micro USB slot used to connect the power supply.IthasfourUSBports.TheEthernet port is used to connect the network connectivity. This pi 3 has the inbuilt Bluetooth and wi-fi connectivity. To connect the projector or monitororTvusingHDMIportandtheHDMI to VGA converter used to connecttotheprojector.Wecanuse the SD card forloading the operatingsystemforit.Weusethe smartphone charger for providing the power supply. Operating System for the Raspberry Pi is Raspbian. This free operating system is known as the modified version of the popular OS Debian. It promotes python and scratch as the main programming languages, with support for many other languages. We can use Python language for programming in Raspberry pi. Python is a wonderful and powerful programming language that’s easy to use. 5.2 Fingerprint Module Fig -3: Fingerprint Module R307 R307 fingerprint moduleis afingerprintsensorwith a transistor-transistorlogicinterface.Thefingerprintmodule can directly interfacewith3.3or5v Microcontroller.Theuser can store the fingerprint data in the module and can configure it in 1:1 or 1: N mode for identifying the person. Fingerprint Module consists of high-speed DSP processor, high-performance fingerprint alignment algorithm, high-capacity FLASH chips, and other hardware and software composition, stable performance, simple structure, with fingerprint entry, image processing, fingerprint matching, search and templatestorage,andother functions. 5.3 Webcam Fig -4: Webcam A camera records andstoresphotographicimagesin digital form. Many current models are also able to capture sound or video, in addition to still images. Capture is usually accomplished by the use of a photosensor, using a charged coupled device. An image sensor is an electronic, photosensitive device that converts an optical image into an electronic signal. This light detector is one of two types, eithera charge- coupled device (CCD) or a CMOS image sensor. In a camera, light from the thing you are photographing zooms into the camera lens. This incoming "picture" hits the image sensor chip, which breaks it up into millions of pixels. The sensor measures the color and brightness of each pixel and stores it as a number. Here we use a normal USB web camera to capture the candidate image and store it as a digital image. 5.4 PIR Sensor Passive Infrared sensors (PIRs) are electronic devices that are used in some security alarm systems to detect motion of an infrared emitting source, usually a human body. PIR is made of a pyroelectric sensor, which can detect different levels of infrared radiation. Itworksentirely by detecting the IR radiation emitted by the objects. Outdoor passive infrared: The detection distance ranges from 10 meters to 150 meters. When the sensor is idle, both slots detect the same amount of IR, the ambient amount radiated from the room or walls or outdoors. When a warm body like a human or animal passes by, it first
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2358 intercepts one half of the PIR sensor, whichcausesa positive differential change between the two halves. Fig -5: PIR Sensor Window made of IR transmissive material that protects the sensing element. This sensor has three pins. They are Drain/VCC, Source/Out,Ground.Usually,itusesthe power is 3v to 5v DC input but maybe high as 12 v. The output digital pulse is 3.3v when it is triggered. The output digital pulse is 0v when it is idle. Indoor passive infrared detection distances range from 25 cm to 20 m. It has low power consumption of 65mA andtheoperatingtemperature is -20o to 80oC. 5.5 Liquid-Crystal Display Fig -6: Liquid-Crystal Display LCD (Liquid Crystal Display) screen is an electronic display module and find a wide range of applications. A 16x2 LCD is a very basic module and is very commonly used in various devices and circuits. These modules are preferred over seven segments and other multi segment LEDs. A 16x2 LCD means it can display 16 characters per line and there are 2 such lines. In this LCD each character is displayed in the 5x7 pixel matrix. This LCD has two registers, namely, Command and Data. The command register stores the command instructions given to the LCD.Acommandisan instruction given to LCD to do a predefined task like initializing it, clearing its screen, setting the cursor position, controlling display, etc. The data registerstoresthedatatobe displayed on the LCD and brightness can be adjusted by external potentiometer. 6. METHODOLOGY The step-by-step procedure of the proposed system.  Capture the candidate face by camera  Use Image Restoration convert it into grayscale image  Scan the fingerprint of candidate  Matching with dataset values  Every status display using LCD  Verification done successfully the doorwillopen then allow to attend examination  If any mismatch, send alert to management, trigger alarm and door remains closed 6.1 Camera Use of camera, we can capture the candidate and detect their face by using the Haar Cascade Classifier algorithm with defining the height and width of the image. 6.2 Image Restoration Image restoration is an area that also deals with improving the appearance of an image. However, unlike enhancement, which is subjective, image restoration is objective, in the sense that restoration techniques tend to be based on mathematical or probabilistic models of image degradation. Fig -7: Image Restoration 6.3 Fingerprints Fingerprints are one of many forms of biometrics used to identify an individual and verify their identity. The analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns. The three basicpatternsoffingerprint ridgesarethe arch, loop, and whorl. Arch Pattern - An arch is a pattern where the ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2359 Loop Pattern - The loop is a pattern where the ridges enter from one side of a finger, form a curve, and tend to exit from the same side they enter. Whorl Pattern - In the whorl pattern, ridges form circularly around a central point on the finger. Fig -8: Fingerprint Patterns 6.4 Dataset Store the candidate's image in the dataset on the registration of the examination. Later on, use OpenCV to perform face recognition on a dataset of our faces beforethe examination. Examples of images in the dataset, here 30 photos but we can take n number of candidate photos to improve matching efficiency. Fig -9: Images in Dataset 6.5 Servomotor Here we use servomotor for opening and closing a door depends on the candidate verification process. If verification is done successfully then the door will open. Otherwise, the door remains closed. 7. CONCLUSIONS The proposed system used PIR sensor. If any object motion is there it helps to turn on the camera to capture the candidate image and compare it with the existing images in datasets. If the image matched then checks the biometric data by using the fingerprint moduleandthentheauthorized to attend the examination. If any mismatch in the image and the biometric data an alert mail will sendtothemanagement that includes captured image and the candidate details. It is help to reduce the proxy in the examination. This system is more reliable and easier to find an unauthorized person. REFERENCES [1] Sheng Liand, Xinpeng Zhang, “Toward Construction- Based Data Hiding: From SecretstoFingerprintImages”, IEEE Transaction on Image Processing, vol. 28, NO. 3, March 2019. [2] Yong Yew Yeap, U. U. Sheikh, and Ab Al-Hadi Ab Rahman, “Image Forensic for Digital Image Copy Move Forgery Detection”, ICSPA 2018, 9 -10 March 2018. [3] Sanjay Thakre, Ambikesh Kumar Gupta and Shilpi Sharma, “Secure Reliable Multimodel Biometric Fingerprint and Face Recognition”, ICCCI -2017),Jan.05 – 07, 2017. [4] R. Kaur and A. Kaur, “Copy-Move Forgery Detection Using ORB and SIFT Detector,” vol. 4, no. 4, pp.804–813, 2016. [5] M. F. Hashmi, V. Anand, and A. G. Keskar, “A copymove image forgery detection based on speeded up robust feature transform and wavelet transforms,” Proc.- 5th IEEE Int. Conf. Comput. Commun. Technol. ICCCT 2015. [6] Gaganpreet Kaur, Dheerendra Singh, Sukhpreet Kaur, “Pollination Based Optimization for Feature Reduction at Feature Level Speech & Signature Biometrics”, ICRITO, AIIT, Amity University Uttar Pradesh, Noida, India, 8-10-2014. [7] Dapinder Kaur, Gaganpreet Kaur, Dheerendra Singh, “Efficient and Robust Multimodal Biometric System for Feature Level Fusion (Speech and Signature)”, IJCA (0975 – 8887) Volume 75– No.5, August 2013. [8] H. He, X. Huang, and K. Jun, “Exposing copy-move forgeries based on a dimension-reduced SIFT method,” Information Technology Journal, vol. 12, no. 14. pp. 2975–2979, 2013. [9] Z. Mohamadian and A. A. Pouyan, “Detection of duplication forgeryindigital imagesinuniformandnon- uniform regions,” Proc. - UKSim 15th Int. Conf. Comput. Model. Simulation, UKSim 2013, vol. 1, pp. 455–460, 2013. [10] Shweta Gaur, V.A.Shah, Manish Thakker, “Biometric Recognition Techniques: A Review”, IJARE, Vol. 1, Issue 4, October 2012. [11] R. Babaei, O. Molalapata, and A. A. Pandor, Face Recognition Application for Automatic Teller Machines (ATM), in ICIKM, 3rd ed. vol.45, pp.211-216, 2012.