ArticlePDF Available

Application of Smartphone Qrcode Scanner as a means of Authenticating Student Identity Card

Authors:
International Journal of Engineering Research and Technology. ISSN 0974-3154, Volume 13, Number 1 (2020), pp. 48-53
© International Research Publication House. http://www.irphouse.com
48
Application of Smartphone Qrcode Scanner as a means of Authenticating
Student Identity Card
Adeniyi Abidemi Emmanuel1, Amusan Elizabeth Adedoyin2, Olagunju Mukaila3 and Ogundokun Oluwaseun Roseline1
1Department of Computer Science, College of Pure and Applied Sciences, Landmark University.
2Department of Computer Science and Engineering, Faculty of Engineering and Technology,
Ladoke Akintola University of Technology, Ogbomoso.
3Department of Computer Science, Faculty of Sciences, Federal University, Oye-Ekiti, Ekiti State.
ORCID: 0000-0002-2728-0116 (Adeniyi)
Abstract
The smartphone scanner is the best tool to authenticate any
object with embedded Qr codes anytime and anywhere. This
smartphone scanner will make it easier and simpler to encode
the generated code without any difficulty. The need for this
research is to enhance the quality time of authentication which
can now be done anywhere and anytime without the problem
of location and connectivity issue. However, smart card
technology has not been fully embraced, particularly in
developing countries like Nigeria because of our lack of
innovation in information technology. As a solution, this work
presents a real time student identity card authentication
system with the aid of android phone camera scanner in built
function. The developed system accepts as input, a
matriculation number which is unique for every student and
encrypts it into a two-dimensional bar code using a QR
generator. The generated QR code is then embedded in the
identity card alongside other details of the cardholder which
produce a dynamic authentication output. A software
application that functions as a QR scanner is pre-installed on
the smartphone. This makes it possible to reverse this process
during authentication for a reconciliation of the decrypted
code with the student matriculation number. The result of the
experiment reveals that the smartphone scanner is effective
and faster to authenticate the embedded qr code trademark
than any other means of authentication.
Keywords: Smartphone Camera, Identity Card, QR code, QR
generator, QR scanner, Smartphone.
INTRODUCTION
Authentication of any object with trademark is indispensable
in this era of Information Technology as production of fake
items has become rampant. The use of smartphone scanner to
verify the originality an item is necessary as it is fast and easy
to implement and use (Bajpai and Agrawal, 2013).
Authentication of a student identity card with the aid of a
smartphone scanner is a method of identifying the quick
response code trademark embedded in each student identity
card. To automatically identify a student is a token of an eye,
smartphone are increasingly being used. Authentication is the
process of confirming the real identity of an attribute of a
piece of data claimed true by an entity. A student Identity card
is said to be the summary of a student's information and with
the speedy increase of students in our institutions, it is now a
must for every institution to have a means of automatic
authentication of each student. It is highly essential for an
educational institution to provide Identity card dynamically
with quick response code embedded and that can easily be
authenticated using a smartphone for every student.
Automatic Authentication of Student Identity card with Quick
response code and smartphone system is actually means of
maximize the usage of student ID card and also by doing that,
it will upgrade the system that been used in the Identification
of student card nowadays. With the successful implementation
of dynamic Qr code in student identity cards, it can also help
in other students activities within the campus, for example,
student lecture attendance, library usage, hostel insurance and
while taking the final examination. Other than that much
higher institution still uses their own in a house security guard
to check student in and out during peak hour. Rather than use
a person, why not all higher institutions have their own
automatic barrier that needs the student to swipe their own
identity card before entering campus areas. This will totally
increase the safety of their learning places.
The rapid development of various aspects of computer
technology gives rise to the usage of various information
technology gadgets in our day to day activities (Richard,
2102). In this research work, a quick response code is
embedded to student identity card and smartphone is used to
authenticate the encrypted embedded quick response code
automatically which will redirect to a site to authenticate the
encrypted code. This proposed work uses a web application to
generate an embedded student identity card locally on the
computer system and whenever the need arises for
authentication of the card, the identity card is placed under
smartphone camera, the smartphone scan the embedded quick
response code and decrypt the encrypted details for
verification. This process is purely automatic authentication
process. It does not require manual entry on matriculation
before performing the authentication process.
International Journal of Engineering Research and Technology. ISSN 0974-3154, Volume 13, Number 1 (2020), pp. 48-53
© International Research Publication House. http://www.irphouse.com
49
RELATED WORK
There are many proposals for a student identity card with
quick response code and smartphone. Most of them to focus
on the application of static nature of qrcode verification which
does not redirect to the webpage where the code is being
generated and also internet connectivity of either the
smartphone or the software application, while the closely
related make use of manual input of matriculation number
before authentication. In this section, we will mention briefly
a few of these proposals.
Bajpai and Agrawal (2013) presented a paper on personalized
data, signature and picture of cardholders were captured, their
systems generated barcode in 2-dimensional formats which
represents the captured data and embedded this barcode image
on the identity card. The validation and authentication of this
card they produced were done on an online centralized
database. The intention of their authentication was to match
the encrypted unique identity of the person in the barcode's
image with the one in the online central database. The major
shortcoming of their work was that solely depends on internet
connectivity for its operation.
Singhal and pavithr (2015) use quick response code and
smartphone for verification and authentication of an
educational certificate. In their work, the QR code was
embedded on the student certificate that decrypts the signature
from the university's public key in order to generate the hash
value for verification. For the certificate to pass the
authentication process, the hashed value generated from the
certificate must match that of the university's public key
otherwise, the certificate will not pass the authentication
process. This work was a purely online system which will
render the authentication process unless whenever there is no
internet connectivity.
Cho and Bae (2014); Masalha and Hirzallah (2014); Kumar
and Kareemulla (2017) these researchers proposed an online
attendance system for both the staff and student using QR
code and Smartphone. In this work, the Staff is required to
generate a QR code that would be scanned by the students and
sent through the wireless network for necessary automatic
attendance checking. In other to avoid proxy of attendance,
Kumar and Kareemulla introduced fingerprint and voice
verification to authenticate the attendance system.
Ayeleso, et al. (2017) proposed an embedded QR code on
identity card to be given to students and introducing
Smartphone App to authenticate the embedded QR code.
Their proposed system is an offline system which does not
require a network connection for authentication. The major
shortcoming of their work is that student matriculation
number has to be manually inputted before authentication.
The first three work reviewed earlier shows that their
proposed systems work with the internet connection. That is
their operation is solely dependent on the availability of
internet access and the cost implication can be a barrier of
adopting the system. The fourth reviewed work is closely
related to this work since is offline but the issue of manually
inputting student matriculation number before authentication
gives rise to this offline and automatic QR code
authentication.
MATERIAL AND METHOD
The proposed system was modeled using a Quick Response
code and smartphone for dynamic authentication of embedded
code. The quick response code is read by an imaging device,
such as camera and authenticate by smartphone until the
image can be appropriately interpreted. Data is then extracted
from patterns present in both horizontal and vertical
components of the image. The Figure below shows a sample
of an unencrypted QR code that will be needed by the
proposed system.
Figure 1: The Structure of Quick Response Code (Ayeleso, et al., 2017)
International Journal of Engineering Research and Technology. ISSN 0974-3154, Volume 13, Number 1 (2020), pp. 48-53
© International Research Publication House. http://www.irphouse.com
50
The Proposed System Model
Figure 2: Model for the proposed system.
The proposed automatic authentication of student identity card
using QR code and Smart Phone work as thus:
Collect the necessary student details during the registration
processing.
Use the student unique value as an input process to generate
and encrypt QR code.
Embed the generated QR code into the Student ID card.
Launch QR code Scanner on the smartphone
Place the Student ID card under the camera of the smartphone
The camera scans the embedded QR code and redirect to
webpage before authenticates the Unique and encrypted value
embedded on the Student ID.
RESULT DISCUSSION
This section serves the purpose of explaining all the program
implementation and the entire process of program
implementation. It covers areas such as input interface, output
interface, menu interface, system testing, system maintenance,
writing and testing of the computer program, routines that
make up the new system to function very well and for it to
achieve its objectives.
This is where the system administrator enters the username
and password in other to gain access to the administrator
control panel.
Figure 3: Home Page.
Collect Student
details
Input the Qr code
determinant data
Symbolic version of
the determinant
Module size of the
determinant
Embed and Display
the Student ID
with the supplied
Details
lauch default Qr code
scanner on smart phone
place the Student ID under
the phone camera
if the QR code is genuine,
the student encrypted
information will be
displayed.
else, such ID is not a valid
student ID.
Embedded code redirect
to webpage
Qrcode Generator
Webpage
Generate Qr
code
Student ID
Administrator
International Journal of Engineering Research and Technology. ISSN 0974-3154, Volume 13, Number 1 (2020), pp. 48-53
© International Research Publication House. http://www.irphouse.com
51
Figure 4: Add Student Details
This figure displays where basic information about the student
will be entered before it proceeds to the upload of passport
and signature.
Figure 5: Passport and Signature Upload.
This figure displays where the student will upload his/her
passport and signature before he/she proceeds to qrcode
generation module.
Figure 6: List of Registered Students
Figure 6 displays the list of all registered student that QR code
ID has been generated for.
International Journal of Engineering Research and Technology. ISSN 0974-3154, Volume 13, Number 1 (2020), pp. 48-53
© International Research Publication House. http://www.irphouse.com
52
Figure 7: Qrcode Generated
This figure displays the generated quick response code which
on click on the proceed to the card will embed the QR code
into the identity card.
Figure 8: Generated Student Identity Card with Qrcode from student details.
This figure displays the student identity card from the student
details and also embeds the generated quick response code
from the student unique number.
Figure 9: Student Identity Card with QR code authentication process.
Figure 9 displays how student identity card with the qrcode
undergoes authentication process with the smartphone. The first image is the process of the authentication while the
second image is the result of the QR code scanning.
International Journal of Engineering Research and Technology. ISSN 0974-3154, Volume 13, Number 1 (2020), pp. 48-53
© International Research Publication House. http://www.irphouse.com
53
Performance Goal
Different scanners were used to carry out the experiment and
it was discovered that there were no significant differences in
the authentication processing using the different scanner but
the time taken by each scanner makes the smartphone looks
preferable than other since it take little time to verify the
embedded code. That is, the type of tool used for
authentication will determine how fast the process will take
and it was discovered that subsequent scanning of this code of
all devices takes little time compare to first scanning process.
Table 1: Experimental Results
Scanner Used
Time in Seconds
Android Phone
3.22
Windows Phone
4.50
Other Scanner
4.00 average
Samsung Tab
3.34
CONCLUSION
From the output of the discussion of result and experiment
performed, it can be concluded that any smartphone with
quick response code reader embedded will be able to capture
the exact encrypted data faster during the authentication
process. This aim of this research work was achieved. As the
embedded code on the student identity card was able to be
decrypted automatically with the aid of the smartphone quick
response reader without the need for any manual input of
previous data during the verification stage. In the future, this
application can be applied to various activities that require
verification and authentication. It can also be used in a
supermarket for stock price list instead of the barcode.
REFERENCES
[1] Singhal, A., & Pavithr, R. (2015). Degree Certificate
Authentication using QR Code and Smartphone.
International Journal of Computer Applications, 120(16),
3843.
[2] Cho, D., & Bae, M. (2014). A Study on Development of
OTIP System using QR Code based on Smartphone.
International Journal of Multimedia and Ubiquitous
Engineering, 9(10), 261270.
https://doi.org/http://dx.doi.org/10.14257/ijmue.
2014.9.10.25
[3] Ayeleso, et al., (2017). Identity card Authentication
System Using QR code and Smartphone. International
Journal of Science, Engineering and Environmental
Technology. Vol. 2(9): 61-68. ISSN 0796-9650.
[4] Kumar, B. D., & Kareemulla, S. (2017). Smart Mobile
Attendance System for Employees Using QR Scanner.
Asian Journal of Applied Science and Technology
(AJAST), 1(5), 3539.
[5] Kumar, B., Sharma, N., & Yadav, N. (2014). Educational
Application of QR (Quick Response) Code. International
Journal of Advanced Research in Computer Science &
Technology (IJARCST 2014), 2(3), 373375.
[6] Masalha, F., & Hirzallah, N. (2014). A Students
Attendance System Using QR Code. International
Journal of Advanced Computer Science and Applications
(IJACSA), 5(3), 7579.
[7] Richard Dybowski. 2012. The Class Lectures. IT project.
September-October. London: School of technology and
Management.
[8] Bajpai, M, and Agrawal, A. (2013). Integration of 2D
Barcode in Identity Cards: A New Approach.
International Journal of Engineering and Computer
Science. Vol. 2(4): 1225-1233.
... The smartphone scanner is the best tool to authenticate any object with embedded QR codes anytime and anywhere. This smartphone scanner will make it easier and simpler to encode the generated code without any difficulty (5) . ...
... In [34], the research proposes a system for real-time student identity card authentication using a QR code and a smartphone scanner. The system generates a unique QR code containing a student's matriculation number and other details, which is embedded in the identity card. ...
... Emmanuel, Adedoyin, Mukaila & Roseline [10] States that there are changes to the data on the Universitas Airlangga system, students often find it difficult to verify the mark that came out in the Kartu Hasil Studi (KHS) is called Study Result Card or courses taken in the Kartu Rencana Studi (KRS) is called Study Plan Card. This convoluted KRS and KHS verification process arose because student-owned KRS and KHS documents are easier to forge than data stored in the system. ...
Article
Full-text available
Over the years there has been a continuous request by Organizations Academic Institutions, Recruiters and Employers to verify graduated students' statements of results from Federal Polytechnic, Mubi. This occurs as a result of the delay in issuance of Certificates which are expected to be ready after three years of Student graduation as it is obtainable by other Institutions in the country. This issue is causing Organizations, Institutions and the Polytechnic time and resources over the years. This paper aims to design an online result verification system that will provide easy, fast and real-time verification of student Statements of the result. This system of verifying students' results will reduce the level of result forgery, ease the stress on the Polytechnic and reduce verification time which is done by physical document verification. The current system requires an employer or anybody concerned to send a representative to the Exams and Record Unit of the Polytechnic to verify a particular statement of result which takes a long time and is not cost-effective. This paper designed and implemented a proposed Web Base Statement of Result Verification System using Hypertext Markup Language (HTML), Cascading Style Sheets (CSS), JavaScript, Hypertext Preprocessor (PHP), MySQL Database and Windows, Apache, MySQL, and PHP (WAMP) Server. Unified Modeling Language (UML) Diagrams and System Architecture were designed for the proposed system. The proposed system was designed to process student results with an embedded Quick Response (QR) code and a Result Verification Code (RVC) which will help organizations to verify students’ statements of results in real-time. This system could be integrated into an already existing institution's official portal.
... Adobe XD was used to model the system while the Ionic framework was used because it allows for quick prototyping and the pleasant environment when integrated with Angular. Mobile phones are portable devices; so far, they can be moved easily from one place to another [22][23][24][25][26][27]. The mobile phone as proposed in this research will be the best tool to achieve a seamless voting process in this part of the world and as well eliminate any form of chaos during and aftermath of the election process in Nigeria. ...
Chapter
Voting is a concept used to describe the part of the election process. It is a means by which the citizens choose who to lead them for a designated period. There is various type of manual and electronic voting processes currently in use. Manual voting processes have become a tool by which government bodies in Nigeria and other African countries at considerable take advantage of to push unworthy people into power. The Nigeria voting system is a typical example of this misfortune, where voters are subjected to long queues before they can perform their legal duty as a citizen. This existing system is faced with numerous challenges such as hooliganism where glorified thugs snatch ballot boxes and disrupt the peace and tranquillity of the voting process. Therefore, a loyal citizen who is bound to vote is unable to perform their legal duty, leading to the manipulation of results and other voting crises. This research proposed a mobile voting platform to deal with the challenges as mentioned earlier associated with a manual voting system that is ineffective and inconvenient for citizens. The proposed system will improve how the election is being conducted in Nigeria and other countries that are faced with similar challenges in the voting process. The scheme aims to allow eligible voters with registered voters card (PVC) in Nigeria and diaspora to cast their votes in their respective places of residence as long as the mobile application is accessible on their mobile devices which will be available on various versions such as Android, iOS, Windows operating system. Each voter’s details will be secure through the use of various cryptographic techniques and verified with the use of one-time password during the voting process. This process will make the election process flawless, efficient, convenient, secured and timely in the area of result compilation and final verdict. Also, the system will eliminate violence and result in manipulation.
... It is projected that the demand for IoT devices will rise to 20-30 billion by 2020 [63]. So far, IoT has provided a range of innovations, for example, a remote detector network, barcodes, intelligent monitoring, RFID [64], NFC, fast energy digital communications, cloud storage, etc. [57,[65][66][67]. Such technology evolutions introduce innovations to IoT [68][69][70]. ...
Chapter
Full-text available
Internet users have been faced with a lot of threats with the growth of malware around the world. Ransomware, one of the significant types of malware, encrypts sensitive information and will not release the files until the user paid a ransom. Internet of Things (IoT) structure is an extensive area of Internet-associated instruments with additional computational capabilities with storage capacities that have the potential to be harmed by ransomware developers. The IoT has been speedily becoming more intense over the earlier years, and meanwhile, in these phases, one of the weakest areas is security. Security affairs had continued to be a crucial worry for businesses, despite the efficiency and prevalence of IoT growth. Therefore, the paper presents a machine learning model to detect ransomware attacks on IoT devices. The study used Power—to track and review the power consumption in 500 ms internals of all operating processes. The paper used three devices to perform the experiments, namely: Android device, Laptop computer, and Projector. The model was used to the monitoring power consumption of IoT devices using various procedures to categorize Ransomware outside non-malicious operations. Comparing the proposed system with the existing model outperforms concerning correctness ratio, precision ratio, recall ratio, and F-measure were considered.
Article
Full-text available
Human resource management requires good documentation and good data processing. In workspaces such as offices and factories, employee salaries are determined by calculating attendance at each hour of work. Tracking and collecting attendance data for a large number of employees is a difficult thing to do. We need a secure system to facilitate the process of collecting and tracking presence data. We propose an attendance system that uses random quick response code (QR-codes) as one time password (OTP) to improve security. Employees are required to scan the QR-code within ten seconds before it is changed and randomized each time. The proposed attendance system facilitates data collection using employees’ smartphones and Mac-Address as unique identification numbers. The system is able to track employees’ arrival and departure times. We have implemented the system at the local university to collect lecturer attendance data then analyze its security and statistic in all scanning activities. The average time needed by a user to authenticate their presence in the system is 25.8877 seconds. The steps needed to sign in and out from the system are fewer than other previous researches. Those findings tell us that the approach is straightforward and more uncomplicated than other proposed methods. We conclude that randomized QR-code scanning is a relevant scheme to be applied in a secure attendance system. © 2022 Institute of Advanced Engineering and Science. All rights reserved.
Chapter
The idea of smart cities is attracting support each day and has emerged as a solution to solve the unprecedented problems of accelerated urban development and growing population explosion and, at the same time, give residents and tourists a better lifestyle. The smart city bears some responsibility for both planned and unforeseen circumstances, and the potential of alleviating the influence of instability on the causes of disturbance by evaluating all possible data produced by the city introduces new opportunities for resilience activity. The Internet of Everything (IoE) alongside advanced networking technology is an important means of achieving smartness in every smart city system. Companies and policymakers around the world are making a great deal of effort to support the value of lowering electricity use and carbon emissions, as well as the green IoE for smart cities. Therefore, this chapter lays out a new system for upgrading smart cities that have lowered power usage at each level to ensure the implementation of IoT towards a green climate. The chapter also identifies core innovations, resources, threats, and potential prospects in these fields.
Article
Full-text available
Sistem jimpitan desa adalah salah satu penerapan teknologi informasi yang mempermudah pengambilan uang dari satu rumah warga ke rumah warga yang lain. Selama ini sistem yang dijalankan dalam suatu desa masih menggunakan sistem manual seperti meletakkan uang di dalam wadah plastik kemudian petugas desa akan mengambilnya. Oleh karena itu, diperlukan sebuah sistem jimpitan dengan tujuan untuk memudahkan petugas dalam pendataan jimpitan yang berbasis Quick Response Code (QR Code). Tugas akhir ini menggunkan metode Waterfall salah satu dari metode Developing Life Cycle (SDLC) dengan menggunakan bahasa pemrograman Codeigniter. basisdata MySQL, dan laptop sebagai hardwarenya. Hasil yang diperoleh yaitu sistem jimpitan yang dirancang untuk layanan publik dan memiliki fitur scan QR Code, pengelolaan data, dan menyajikan laporan keuangan jimpitan yang dapat dipertanggungjawabkan. Pengujian sistem jimpitan mengunakan teknik Blackbox yang mampu menghasilkan nilai 96% di dapat melalui presentase seluruh jawaban responden. Kesimpulan dari penelitian ini adalah dengan adanya sistem jimpitan diharapkan mampu meningkatkan produktiftas desa. Digitizing the jimpitan system in Dukuh Ngluwar, Tepisari Village Abstract Village pinch system is one application of information technology that makes it easy to withdraw money from one resident's house to another resident's home. During this time, the system that is run in a village is still using a manual system such as putting money in plastic containers, and then village officials will take it. Therefore, it requires a pinch system to facilitate the officer in the data collection of the pinch-based Quick Response Code (QR Code). This final project uses the Developing Life Cycle (SDLC) method, Code Igniter programming language, MySQL for database loading, and laptop hardware. The results obtained are a pinch system which is designed for public service and has a QR Code scan feature, data management, and presents a financial report on the pinch that can be accounted for. Testing the jimpitan system using the Blackbox technique, which can produce 96%, can be done through the presentation of all respondents' answers. This study concludes that the existence of a Jimpitan system is expected to improve village productivity.
Article
Full-text available
Smartphones are becoming more preferred companions to users than desktops or notebooks. Knowing that smartphones are most popular with users at the age around 26, using smartphones to speed up the process of taking attendance by university instructors would save lecturing time and hence enhance the educational process. This paper proposes a system that is based on a QR code, which is being displayed for students during or at the beginning of each lecture. The students will need to scan the code in order to confirm their attendance. The paper explains the high level implementation details of the proposed system. It also discusses how the system verifies student identity to eliminate false registrations.
Article
Today, as the supply of smart phones becomes active and a variety of functions of smart phones and services based on internet is utilized, a wide range of applications are being developed and deployed. Despite the rapid growth of smart phones and the application market, the attendance book which is currently being used is still in its primitive forms. Previously developed automatic attendance or absence check system requires additional equipments such as RFID reader and fingerprint reader, with higher deployment costs and has problems of management such as mechanical failure and dishonest attendance.
Identity card Authentication System Using QR code and Smartphone
  • Ayeleso
Ayeleso, et al., (2017). Identity card Authentication System Using QR code and Smartphone. International Journal of Science, Engineering and Environmental Technology. Vol. 2(9): 61-68. ISSN 0796-9650.
Smart Mobile Attendance System for Employees Using QR Scanner
  • B D Kumar
  • S Kareemulla
Kumar, B. D., & Kareemulla, S. (2017). Smart Mobile Attendance System for Employees Using QR Scanner. Asian Journal of Applied Science and Technology (AJAST), 1(5), 35-39.
Educational Application of QR (Quick Response) Code
  • B Kumar
  • N Sharma
  • N Yadav
Kumar, B., Sharma, N., & Yadav, N. (2014). Educational Application of QR (Quick Response) Code. International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014), 2(3), 373-375.
Integration of 2D Barcode in Identity Cards: A New Approach
  • M Bajpai
  • A Agrawal
Bajpai, M, and Agrawal, A. (2013). Integration of 2D Barcode in Identity Cards: A New Approach. International Journal of Engineering and Computer Science. Vol. 2(4): 1225-1233.