Fake User Identification and Duplication Detection Using Aadhaar Card

Authors

  • Karan Balakrishna Patil Student, Department of Computer Engineering, Pillai HOC College of Engineering and Technology, Rasayani, HOC Colony, Tal Rasayani, Maharashtra, India
  • Shriyash Ravi Patil Student, Department of Computer Engineering, Pillai HOC College of Engineering and Technology, Rasayani, HOC Colony, Tal Rasayani, Maharashtra, India
  • Tushar Prakash Jadhav Student, Department of Computer Engineering, Pillai HOC College of Engineering and Technology, Rasayani, HOC Colony, Tal Rasayani, Maharashtra, India
  • Snehal Chitale Faculty, Department of Computer Engineering, Pillai HOC College of Engineering and Technology, Rasayani, HOC Colony, Tal Rasayani, Maharashtra, India

Keywords:

Security, Privacy, Authentication, verification, Fake detection, Data duplication, Aadhaar card, CNN and OpenCV, Face recognition

Abstract

Various universities are facing several issues concerning students' fake enrollment, duplication, and authentication of student details. Here we are providing solutions to improve student enrollment process for various exams by using convolutional neural networks (CNN) and OpenCV (Open-Source Computer Vision Library). A solution to the existing system must be versatile and precise. If the project aims to be used for large-scale deployments, then it must be adaptable and accurate in order to be successful. We have used advanced technologies and algorithms such as Convolutional Neural Networks (CNN) and OpenCV for accurate face detection and recognition, as well as the MERN stack for verifying student details. Our implementation fulfills the problem statement by solving the primary concern of universities regarding authentication, duplication, and fake enrollment of the students. After successful verification, the student will be directed to the exam page where any educational activities related to exam can be performed.

References

Kamta Nath Mishra. Aadhar based smart card system for security management in South Asia. 2016 International Conference on Control, Computing, Communication and Materials (ICCCCM), Allahbad, India. 2016 Oct; 1–6. DOI: 10.1109/ICCCCM.2016.7918256.

Joyce Soares, Gaikwad AN. A self banking biometric machine with fake detection applied to fingerprint and iris along with GSM technology for OTP. 2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, India. 2016 Nov; 0508–0512. DOI: 10.1109/ICCSP.2016.7754189.

Ghangare Ajay S, Anup Ranade. Aadhar Card–Perspectives on Privacy. J Int Pharm Res. 2019; 46(5): 135–142. DOI: 10.20944/preprints201809.0130.v1.

Ramya K, Sumathi A. Big Data Applications in Aadhar Card Fraud Detection. Int J Comput Sci Eng. 2019 Mar; 7(3): 865–867. DOI: https://doi.org/10.26438/ijcse/v7i3.865867 | Available online at: www.ijcseonline.org.

Meyliana, Surjandy, Erick Fernando, Cadelina Cassandra, Henry Antonius Eka Widjaja, Yakob Utama Chandra, Harjanto Prabowo. A Blockchain Technology-Based For university student Enrollment Process. 2020 6th International Conference on Computing Engineering and Design (ICCED), Sukabumi, Indonesia. 2021 May; 1–4. DOI:10.1109/ICCED51276.2020.9415856.

Isha Pali, Lisa Krishania, Divya Chadha, Asmita Kandar. A Comprehensive Survey of Aadhar and Security Issues. arXiv:2007.09409 [cs.CR]. 2020 Jul.

Roy DA, Soni US. IRIS segmentation using Daughman's method. In2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) 2016 Mar 3 (pp. 2668–2676). IEEE.

Rahmatallah Hossam Farouk, Heba Mohsen, Abd El-Latif Yaser M. A Proposed Biometric Technique for Improving Iris Recognition. Int J Comput Intell Syst. 2022 Aug; 15(1): 79. https://doi.org/10.1007/s44196-022-00135-z.

Siamul Karim Khan, Patrick Tinsley, Adam Czajka. An identity-preserving model of iris texture deformation. arxiv.2207.08980. 2022 Jul. doi: 10.48550/arxiv.2207.08980.

Pragati Mynampati, Girijamma HA. Fraud Management System for UID Aadhaar. Int J Sci Eng Res. 2019 Aug; 10(8): 157–161. ISSN 2229-5518.

Laura Pryor, Rushit Dave, Jim Seliya, Evelyn Sowells Boone. Machine Learning Algorithms in User Authentication Schemes. arXiv.2110.07826. 2021 Oct. https://doi.org/10.48550/ar Xiv.2110.07826.

Published

2023-06-12

How to Cite

[1]
K. B. . Patil, S. . Ravi Patil, T. . Prakash Jadhav, and S. . Chitale, “Fake User Identification and Duplication Detection Using Aadhaar Card”, JoSETTT, vol. 10, no. 1, pp. 13–19, Jun. 2023.