Download complete project materials on Biometric Data Capturing System for National Identity Management Commission from chapter one to chapter five with references
ABSTRACT
PASS 2024 UTME WITHOUT STRESS:- 👉 DOWNLOAD and PRACTICE with 2023 UTME CBT APP 📱👈
CLICK to DOWNLOAD NOW.:- 👉 PASS Your POST UTME by Downloading Your School's Post UTME Past Questions and Answers 📱👈
The National Identity Management Commission Act 2007 provides for the establishment of the NIMC, its functions, powers, establishment of the National Identity Database, assignment and use of General Multi-purpose cards, and the National Identification Number (NIN). Every citizen from the age of 16 years and above and legal resident are eligible to enroll the National Identity Number (NIN). Object oriented methodology is being used at the development of a system that consists of the recording of an individual’s demographic data and capturing of the ten finger print, head to shoulder facial picture and digital signature, which are also used to cross check existing data in the database before an identity Card is printed (issued).
TABLE OF CONTENTS
CONTENTS
Declaration
Approval iii
Dedication iv
Acknowledgement v
List of figures vi
List of symbols and abbreviations vii
Abstract viii
Table of contents ix
CHAPTER ONE
Introduction 1
Motivation of Project 3
Statement of Problem 3
Purpose of the Study 4
Methodology 4
Significance 4
Scope of the Study 5
Limitation 5
Definition of Terms 5
CHAPTER TWO
Literature Review 7
Behavioral biometrics 8
Verification vs. Identification 9
Applications 9
Biometric functionality 11
The basic block diagram of a biometric system 12
Multimodal Biometric System 14
Adaptive Biometric Systems 15
Characteristics of Biometric Systems 16
Accuracy 16
False Reject Rate 16
False Accept Rate 17
Crossover Error Rate 17
Speed and Throughput Rate 18
Acceptability to Users 19
Uniqueness of Biometric Organ and Action 19
Resistance to Counterfeiting 20
Reliability 20
Data Storage Requirements 21
Enrollment Time 21
Intrusiveness of Data Collection 21
Subject and System Contact Requirements 22
Historical Biometric Problems 22
Performance 23
Hardware and Software Robustness 23
Maintenance Requirements 24
Susceptibility to Sabotage 24
Perceived Health Maladies Due to Usage 25
Private Information Made Available to Management 25
Different Types of Biometric Systems and their Characteristics 26
Fingerprint Systems 26
Data Acquisition 26
Enrollment Procedure and Time 27
Template or File Size 27
User Actions Required 27
System Response Time 27
Accuracy 27
Field History 28
Problems Experience 28
Unique System Aspects 28
CHAPTER THREE
Methodology and design 29
Method of data collection 29
Inaccuracy 29
Analysis of the Proposed System 30
Use case diagram of biometric system 31
Diagram of Biometric Characteristics 32
Design Methodology 33
Login Table 33
System prototype 35
Interface Design using object oriented language 36
Materials 38
Skill and Cooperation required to use the System 38
CHAPTER FOUR
System Implementation Evaluation 39
Test of Data 39
System Testing 40
User Manual 41
System Implementation 42
CHAPTER FIVE
Summary Conclusion and Recommendation 43
Summary 43
Conclusion 43
Recommendation 44
Reference 45
Appendix 46
CHAPTER ONE
1.0 Introduction
1.1 Background of the Study
About National Identification Management Commission (NIMC)
The National Identity Management Commission Act 2007 provides for the establishment of the NIMC, its functions, powers, establishment of the National Identity Database, assignment and use of General Multi-purpose cards, and the National Identification Number (NIN). The Act also provides the Commission with powers to make regulations connected with its functions. The NIMC Act 2007 provides the repeal of the law that created the former Department of National Civic Registration (DNCR) and the transfer of its assets and liabilities to the NIMC.
Biometric
The term “biometrics” is derived from the Greek words bio (life) and metric (to measure).
Biometrics is becoming an interesting topic now in regards to computer and network security, however the ideas of biometrics have been around for many years. Possibly the first known example of biometrics in practice was a form of finger printing being used in China in the 14th century, as reported by explorer Joao de Barros. He wrote that the Chinese merchants were stamping children’s palm prints and footprints on paper with ink to distinguish the young children from one another. This is one of the earliest known cases of biometrics in use and is still being used today (Joao de, 1986).
In the 1890s, an anthropologist named Alphonse Bertillion sought to fix the problem of identifying convicted criminals and turned biometrics into a distinct field of study. He developed ‘Bertillonage’, a method of bodily measurement which got named after him. The problem with identifying repeated offenders was that the criminals often gave different aliases each time they were arrested. Bertillion realized that even if names changed, even if a person cut his hair or put on weight, certain elements of the body remained fixed, such as the size of the skull or the length of their fingers. His system was used by police authorities throughout the world, until it quickly faded when it was discovered that some people shared the same measurements and based on the measurements alone, two people could get treated as one.
After this, the police used finger printing, which was developed by Richard Edward Henry of Scotland Yard, instead. Essentially reverting to the same methods used by the Chinese for years. However the idea of biometrics as a field of study with useful identification applications, was there and interest in it has grown.
Today we have the technology to realize the aims, and to refine the accuracy of biometric identification, and therefore the possibility of making it a viable field.
Fingerprint Identification
Fingerprinting identification known as (dactylography) or hand print identification, is the process of comparing two instance of friction ridge skin impressions, from human fingers or toes, or even the palm of the hand or sole of the foot, to determine whether this impression could have come from the same individual. The flexibility of friction ridge skin means that no two finger or palm print are ever exactly alike in every details; even two impressions recorded immediately after each other from the same hand may be slightly different. Fingerprint identification also referred to as individualization, involve an expert or expert computer system. Edward, 1880.
1.2 Motivation of Project
Biometric technology has always caught my interest because of personal experiencing at work. Where I work, we use fingerprint recognition technology in other to keep track of times we punch in and out of work. Each employee is set up with a unique Identity Card (ID) number and his/her fingerprint is associated with that unique ID number. This is how the manager of the store is able to keep track of clock in/out times. We use this system for payroll and also to keep track of employee’s hours.
A database is integrated with all of the information of the employee. At end of each week, the manager is able to print out a report that has all of the employee names, ID number, and clocking in and out time. Before being exposed to biometric technology at work, I would also see television shows that had biometric technologies such as Crime Scene Investigation (CSI). By seeing what type of technologies they used in the television show, I had always been interested about biometrics. I am motivated to do a great analysis of the use of fingerprint biometric technology, as well as security issues, benefits and disadvantages. I am also going to state some current issues and hope to implement a solution
1.3 Statement of Problem
Every citizen from the age of 16 years and above and legal residents are eligible to enroll the National Identification Number (NIN). The researcher has identified several problems to justify the undertaking of the study among which are:
- Problem of inaccurate and duplication of a person’s demography
- Vulnerability and inconsistency in the manual system of generating National Identity Number (NIN)
iii. Lack of sophisticated mechanism or security to keep track of successful enrolment.
1.4 Purpose of the Study
The National Identification Number (NIN) is a set of numbers assigned to an individual upon successful enrolment. Once issued to a person cannot be used again, (that is, it cannot be issued to another person even if the previous person is dead). It is the NIN that helps to tie all records about a person in the database and is used to check the identity verified. This project looks at how to generate the NIN and issue an ID card upon successful enrolment other includes:
- To design a computer application to handle National Identification Number
- To increase productivity and efficiency in the process
iii. To effectively keep track records of successful enrolment by designing a biometric identification system.
1.5 Methodology
At work, I have seen how fingerprint biometric technology works. I created some notes that will help me with the final papers that will enhance the content. I observed and analyzed the system at work. Some methods that I have used to find credible and strong content/information was on the web. I also want to see if I can get a copy of the handbook of Fingerprint recognition. This will help me find the necessary information I need to do the analysis and implement the solution of the specific problem.
1.6 Significance
The need for an effective and qualitative secure date file information system is a major internal concern; the important role it plays in the field of Information and Communication Technology (ICT). Therefore, Biometrics Access Control System (BACS) would be of immense benefit to the development of IT world and the IT carrier, particularly in Nigeria to System Administrators (SAs) and Database Administrators (DBAs). With improve finger biometric today hackers and intruders will be denied access to operate freely.
1.7 Scope of the Study
There are different types of biometric systems: fingerprint systems, hand geometry systems, voice pattern systems, retina pattern systems, iris pattern systems, and signature dynamics systems. However, for the purpose of this study, we will limit our study to fingerprint biometric.
1.8 Limitation
This project looks at the development of a system that consist of the recording of an individual’s demographic data and capturing of the ten fingerprint, head to shoulder facial picture and digital signature, which are also used to crosscheck existing data in the database before an id card is printed (issued).
SEE >> HOW TO DOWNLOAD THE COMPLETE PROJECT (CHAPTER 1-5) NOW
WISH TO STUDY & LIVE in UK?:- STUDY, WORK AND LIVE IN the UK Application Form NOW OUT. Call 08030447894