International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 4 - Issue 12, December 2015 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Biometric Secured Result Processing Software For Nigerian Tertiary Institutions

[Full Text]



Oladipo Oluwasegun, Akomolafe, O.T., Oyedeji A.I



Index Terms: Biometric, Nigeria, Result processing, software, Tertiary Institutions,



Abstract: One of the challenges facing result processing in Nigerian tertiary institutions is the problem of insecurity. Untraceable changes are made to students’ result and this result to various disasters such as innocent people losing their jobs since their innocence cannot be proven. Biometric based systems operate on behavioral and physiological biometric data to identify a person and grant required access to a user. Physiological characteristics such as fingerprint remains unchanged throughout an individual’s life time and thus, it can serve as a viable means of identifying and authenticating users who are to access a system. In this study fingerprint biometric based result processing software is developed to ensure that users are well authenticated and are made to see only what they are pre-configured to see and work with. The fingerprint authentication system was developed using visual basic.net. Staff fingerprints were enrolled into the system to form a biometric template which the system validates against at every login attempt on the result processing software. The digital personal one touch ID sdk and other libraries were used in developing the authentication system. The result processing software also ensures that all write transactions to the database are confirmed and identified by forcing another biometric authentication at the point of making a write request to the web server and associated database. This ensures that the exact person initiating the transaction was the same user who logged in to the application. The users identified at login and various confirmation milestones set for write transactions are logged into a table for future reference and audit trail. Conclusively, the developed system has helped to eradicate the problem of user impersonation by ensuring only authorized users are made to access the software and in-turn participate in result processing activities.



[1] S. Asha and C. Chellappan, “Authentication of e-learners using multimodal biometric technology,” Biometrics and Security Technologies International Symposium (ISBAST 2008), pp. 1-6, 2008.

[2] M. Akazue M. 1 and N.F. Efozia, “A review of biometric technique for securing corporate stored data,“ International Conference on Software Engineering and Intelligent Systems, pp. 329-342, 2010.

[3] J.K Ravi, B. Raja and K.R. Venugopal, “Fingerprint Recognition Using Minutia Score Matching,” International Journal of Engineering Science and Technology, Vol .1, no. 2, pp. 35-42, 2009.

[4] A. Ashraf, A.E Kama, A.K Eman and A.E Ebeid, “Score Level Fusion for Fingerprint, Iris and Face Biometrics,“ International Journal of Computer Applications, Vol. 111, no. 4, Feb. 2015.

[5] A.K Jain, “Technology: Biometric recognition,“ nature international journal of science, Vol. 449, pp. 38-40, sept. 2007.

[6] O.O. Ayanuga, O.N Lawal, O. Oladipo and W.A Salau, “Multi-factor Authentication for Social Media,“ Nigeria Computer Society 12th international conference, Vol 26. pp. 168-175, July 2015.

[7] E. Zhu, J. Yin, C. Hu and G. Shang, “Quality estimation of fingerprint image based on neural network, “ international conference of neutral computation, pp. 57-70, 2005.

[8] E. Zhu, J. Yin, C. Hu and G. Shang, “A Systemic method for fingerprint ridge orientation estimation and segmentation,“ pattern recognition, vol. 39, no 8, pp. 1492-1472, 2006.