PASS 2024 UTME WITHOUT STRESS:- DOWNLOAD and PRACTICE with 2024 UTME CBT APP 📱👈
😂 GUARANTEE|:| STUDY, WORK AND LIVE IN THE UK >>>.:- STUDY IN UK! Here is How to Apply to Study and Work In the United Kingdom in 2024

Biometric Data Capturing System for National Identity Management Commission

Download complete project materials on Biometric Data Capturing System for National Identity Management Commission from chapter one to chapter five with references

ABSTRACT

The National Identity Management Commission Act 2007 provides for the establishment of the NIMC, its functions, powers, establishment of the National Identity Database, assignment and use of General Multi-purpose cards, and the National Identification Number (NIN). Every citizen from the age of 16 years and above and legal resident are eligible to enroll the National Identity Number (NIN). Object oriented methodology is being used at the development of a system that consists of the recording of an individual’s demographic data and capturing of the ten finger print, head to shoulder facial picture and digital signature, which are also used to cross check existing data in the database before an identity Card is printed (issued).

TABLE OF CONTENTS

CONTENTS                                                                                                            

Declaration

Approval                       iii

Dedication                     iv

Acknowledgement                    v

List of figures                      vi

List of symbols and abbreviations                    vii

Abstract                      viii

Table of contents                     ix

CHAPTER ONE

Introduction                     1

Motivation of Project                   3

Statement of Problem                    3

Purpose of the Study                  4

Methodology                   4

Significance                     4

Scope of the Study                    5

Limitation                     5

Definition of Terms                    5

CHAPTER TWO

Literature Review                   7

Behavioral biometrics                  8

Verification vs. Identification                        9

Applications      9

Biometric functionality                   11

The basic block diagram of a biometric system                 12

Multimodal Biometric System      14

Adaptive Biometric Systems     15

Characteristics of Biometric Systems    16

Accuracy       16

False Reject Rate      16

False Accept Rate     17

Crossover Error Rate      17

Speed and Throughput Rate     18

Acceptability to Users      19

Uniqueness of Biometric Organ and Action   19

Resistance to Counterfeiting   20

Reliability                              20

Data Storage Requirements   21

Enrollment Time                    21

Intrusiveness of Data Collection   21

Subject and System Contact Requirements  22

Historical Biometric Problems   22

Performance          23

Hardware and Software Robustness             23

Maintenance Requirements          24

Susceptibility to Sabotage            24

Perceived Health Maladies Due to Usage            25

Private Information Made Available to Management             25

Different Types of Biometric Systems and their Characteristics             26

Fingerprint Systems       26

Data Acquisition            26

Enrollment Procedure and Time   27

Template or File Size      27

User Actions Required    27

System Response Time    27

Accuracy                         27

Field History                     28

Problems Experience         28

Unique System Aspects     28

CHAPTER THREE

Methodology and design   29

Method of data collection  29

Inaccuracy    29

Analysis of the Proposed System  30

Use case diagram of biometric system  31

Diagram of Biometric Characteristics  32

Design Methodology    33

Login Table    33

System prototype    35

Interface Design using object oriented language             36

Materials    38

Skill and Cooperation required to use the System  38

CHAPTER FOUR

System Implementation Evaluation    39

Test of Data     39

System Testing      40

User Manual     41

System Implementation     42

CHAPTER FIVE

Summary Conclusion and Recommendation   43

Summary      43

Conclusion     43

Recommendation   44

Reference    45

Appendix    46

CHAPTER ONE

1.0    Introduction

1.1    Background of the Study

About National Identification Management Commission (NIMC)

The National Identity Management Commission Act 2007 provides for the establishment of the NIMC, its functions, powers, establishment of the National Identity Database, assignment and use of General Multi-purpose cards, and the National Identification Number (NIN). The Act also provides the Commission with powers to make regulations connected with its functions. The NIMC Act 2007 provides the repeal of the law that created the former Department of National Civic Registration (DNCR) and the transfer of its assets and liabilities to the NIMC.

Biometric

The term “biometrics” is derived from the Greek words bio (life) and metric (to measure).

Biometrics is becoming an interesting topic now in regards to computer and network security, however the ideas of biometrics have been around for many years. Possibly the first known example of biometrics in practice was a form of finger printing being used in China in the 14th century, as reported by explorer Joao de Barros. He wrote that the Chinese merchants were stamping children’s palm prints and footprints on paper with ink to distinguish the young children from one another. This is one of the earliest known cases of biometrics in use and is still being used today (Joao de, 1986).

In the 1890s, an anthropologist named Alphonse Bertillion sought to fix the problem of identifying convicted criminals and turned biometrics into a distinct field of study. He developed ‘Bertillonage’, a method of bodily measurement which got named after him. The problem with identifying repeated offenders was that the criminals often gave different aliases each time they were arrested. Bertillion realized that even if names changed, even if a person cut his hair or put on weight, certain elements of the body remained fixed, such as the size of the skull or the length of their fingers. His system was used by police authorities throughout the world, until it quickly faded when it was discovered that some people shared the same measurements and based on the measurements alone, two people could get treated as one.

After this, the police used finger printing, which was developed by Richard Edward Henry of Scotland Yard, instead. Essentially reverting to the same methods used by the Chinese for years. However the idea of biometrics as a field of study with useful identification applications, was there and interest in it has grown.

Today we have the technology to realize the aims, and to refine the accuracy of biometric identification, and therefore the possibility of making it a viable field.

Fingerprint Identification

Fingerprinting identification known as (dactylography) or hand print identification, is the process of comparing two instance of friction ridge skin impressions, from human fingers or toes, or even the palm of the hand or sole of the foot, to determine whether this impression could have come from the same individual. The flexibility of friction ridge skin means that no two finger or palm print are ever exactly alike in every details; even two impressions recorded immediately after each other from the same hand may be slightly different. Fingerprint identification also referred to as individualization, involve an expert or expert computer system. Edward, 1880.

1.2 Motivation of Project

Biometric technology has always caught my interest because of personal experiencing at work. Where I work, we use fingerprint recognition technology in other to keep track of times we punch in and out of work. Each employee is set up with a unique Identity Card (ID) number and his/her fingerprint is associated with that unique ID number. This is how the manager of the store is able to keep track of clock in/out times. We use this system for payroll and also to keep track of employee’s hours.

A database is integrated with all of the information of the employee. At end of each week, the manager is able to print out a report that has all of the employee names, ID number, and clocking in and out time. Before being exposed to biometric technology at work, I would also see television shows that had biometric technologies such as Crime Scene Investigation (CSI). By seeing what type of technologies they used in the television show, I had always been interested about biometrics. I am motivated to do a great analysis of the use of fingerprint biometric technology, as well as security issues, benefits and disadvantages. I am also going to state some current issues and hope to implement a solution

1.3 Statement of Problem

Every citizen from the age of 16 years and above and legal residents are eligible to enroll the National Identification Number (NIN).  The researcher has identified several problems to justify the undertaking of the study among which are:

  1. Problem of inaccurate and duplication of a person’s demography
  2. Vulnerability and inconsistency in the manual system of generating National Identity Number (NIN)

           iii.     Lack of sophisticated mechanism or security to keep track of successful enrolment.

1.4     Purpose of the Study

The National Identification Number (NIN) is a set of numbers assigned to an individual upon successful enrolment. Once issued to a person cannot be used again, (that is, it cannot be issued to another person even if the previous person is dead). It is the NIN that helps to tie all records about a person in the database and is used to check the identity verified. This project looks at how to generate the NIN and issue an ID card upon successful enrolment other includes:

  1. To design a computer application to handle National Identification Number
  2. To increase productivity and efficiency in the process

iii.            To effectively keep track records of successful enrolment by designing a biometric identification system.

1.5  Methodology                

At work, I have seen how fingerprint biometric technology works. I created some notes that will help me with the final papers that will enhance the content. I observed and analyzed the system at work.  Some methods that I have used to find credible and strong content/information was on the web. I also want to see if I can get a copy of the handbook of Fingerprint recognition. This will help me find the necessary information I need to do the analysis and implement the solution of the specific problem.

1.6  Significance                                           

The need for an effective and qualitative secure date file information system is a major internal concern; the important role it plays in the field of Information and Communication Technology (ICT). Therefore, Biometrics Access Control System (BACS) would be of immense benefit to the development of IT world and the IT carrier, particularly in Nigeria to System Administrators (SAs) and Database Administrators (DBAs). With improve finger biometric today hackers and intruders will be denied access to operate freely.

1.7   Scope of the Study

There are different types of biometric systems: fingerprint systems, hand geometry systems, voice pattern systems, retina pattern systems, iris pattern systems, and signature dynamics systems. However, for the purpose of this study, we will limit our study to fingerprint biometric.

1.8   Limitation

This project looks at the development of a system that consist of the recording of an individual’s demographic data and capturing of the ten fingerprint, head to shoulder facial picture and digital signature, which are also used to crosscheck existing data in the database before an id card is printed (issued).


SEE >> HOW TO DOWNLOAD THE COMPLETE PROJECT (CHAPTER 1-5) NOW

>GUARANTTEE|:| Score 280 Above in 2024 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE:.: GURRANTTEE Score 280 Above in 2022 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE 📱👈
WISH TO STUDY & LIVE in UK?:- STUDY, WORK AND LIVE IN the UK Application Form NOW OUT. Call 08030447894

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.