Project Materials

BIOCHEMISTRY PROJECT TOPICS BIOLOGY PROJECT TOPICS GENERAL

A Framework for National Integration of Biometric Information

click here to get this project topic material with complete chapters 1-5 for just ₦3000 flat rate.

Do You Have New or Fresh Topic? Send Us Your Topic

A Framework for National Integration of Biometric Information

ABSTRACT

Having a central database for Nigeria which organizations can rely on for identification/verification purposes has been a plan in the pipeline for many years now. This has become urgent because of the nation’s current security challenges and the problem of multiple enrolments across various organizations. All of these organizations collect data, but the data collected is not useful outside the collecting organizations.

According to various reports, the Nigerian government has been trying to create a central database to contain Nigerian nationals’ basic information and biometric information as well, to be managed by the Nigerian Identity Management Commission (NIMC), but to no avail. The project ‘National Identity Database’ creation was started in 2007 and to date has not yet been successful.

This thesis aims to create a central platform for integration of all of these biometric data in order to curb these problems while considering security of access control. In this work, we have created four different web applications and databases, to represent information of four different organizations; Nigerian Immigration System, Independent National Electoral Commission, Bank, NIMC, with NIMC serving as the central point. The data represented includes basic information and biometric information (fingerprints) of their enrolees. The web applications where designed using C#.net on visual studio IDE alongside other supporting software like My connector, Adobe Fireworks and database access with PhpMyAdmin. Each application includes four modules, enrolment, admin, query and verification module. The verification module serves as the platform where different organizations’ applications can interface to the central database, giving the opportunity to identify individuals from any point.

The overall system developed provides a platform for this, in order to curb multiple and indiscriminate collection of biometric (fingerprint) data which is a major challenge in the country at present.

Keywords: Biometric, Central database, Fingerprint, Verification and Identification

TABLE OF CONTENTS

CERTIFICATION2

ABSTRACT5

ACMENTS6

DEDICATION7

LIST OF FIGURES11

LIST OF ABBREVIATIONS12

CHAPTER ONE INTRODUCTION1

1.1 Background to Biometrics1

1.2 State of National Security in Nigeria2

1.3 Aim and Objectives3

1.4 Scope and Limitation3

1.5 Significance of the Study4

1.6 Justification of Study5

1.7 Definition of Terms5

1.8 Organization of the Study5

CHAPTER TWO LITERATURE REVIEW7

2.1
Introduction7

2.2
Overview of Database Systems7

2.2.1
Evolution of Database Technology7

2.3
Database 8

2.3.1
Two-Tier 8

2.3.2
Three-Tier 9

2.4
Database Access Control10

2.4.1
Components of Access Control11

2.5
Biometrics: Its Current State12

2.5.1
Application of Biometrics12

2.5.2
s of Biometrics13

2.6
Fingerprints14

2.6.1
Fingerprint Topologies16

2.6.2
Fingerprint Processing19

2.7
Review of Related Work20

2.8
National Database Examples23

2.8.1
The Social Security Master File23

2.8.2
The EURODAC System24

2.8.3
The UK Police National DNA Database24

2.8.4
The FBI’s Integrated Automated Fingerprint Identification System25

2.8.5
NIMC’s National Identity Database25

CHAPTER THREE
RESEARCH OLOGY26

3.1
Data Collection26

3.2
Model Description and 27

3.2.1
Nigerian Identity Management Commission29

3.2.2
Independent National Electoral Commission29

3.2.3
Central Bank of Nigeria29

3.2.4
Nigerian Immigration Service29

3.3
Centralized National Identity Database29

3.3.1
Identification of Enrolees31

3.4
Database Creation (Back End Design of Application)32

3.5
Windows Form Development (Front End Design)32

3.6
Performance Evaluation of Model33

3.7
Tools Used for Research33

3.7.1
Standard Query Language33

3.7.2
Visual Studio34

3.7.3
My Connector34

3.7.4
Adobe Fireworks34

CHAPTER FOUR
RESULTS AND DISCUSSION35

4.1
Introduction35

4.2
Organizations’ Web Applications35

4.2.1
NIS’s Application Design36

4.2.2
’s Application Design36

4.2.3
Commercial Banks Application Design37

4.2.4
NIMC Application Design38

4.3
Databases of the Organizations40

4.4
Authentication of Enrollees41

4.5
Security Control of System42

CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATION44

5.1
Summary44

5.2
Conclusion44

5.3 Recommendation44

5.4 Suggestions for Further Work45

REFERES46

APPENDIX50

LIST OF FIGURES

Figure 2.1: Two-tier architecture 9

Figure 2.2: Three-Tier 10

Figure 2.3: Attacks on Template Database11

Figure 2.4: Block Diagram of a BIS13

Figure 2.5: Various Biometric Traits14

Figure 2.6: Diagram of a Typical Fingerprint Showing Ridge Endings and Bifurcations15

Figure 2.7: Basic and Composite Ridge Characteristics16

Figure 2.8: Diagram of Arch Patterns17

Figure 2.9: Diagram of Whorl Patterns18

Figure 2.10: Diagram of Loop Patterns18

Figure 2.11: Minutiae points of a processed fingerprint image20

Figure 3.1: Flow Chart of Proposed Methodology28

Figure 3.3: of the Current System in Nigeria30

Figure 3.4: of Proposed Fingerprint-Based Enrolment and Authentication System31

Figure 4.1: Diagram of an Application’s Main Dashboard35

Figure 4.2: NIS enrolment form36

Figure 4.3: Enrolment Form37

Figure 4.4: Commercial Bank Enrolment Form38

Figure 4.5: NIMC Application Main Dashboard39

Figure 4.6: NIMC Enrolment Form39

Figure 4.7: Use Case Diagram of Application40

Figure 4.8: of Multiple Connection for Applications41

Figure 4.9: Verification Platform for Applications42

Figure 4.10: Admin’s control panel43

LIST OF ABBREVIATIONS

BVN Bank Verification Number

CBN Central Bank of Nigeria

DBMS Database Management System

DNA Deoxyribonucleic Acid

EURODAC European Dactyloscopy

IAFIS Integrated automatic fingerprint identification system

Independent Electoral Commission

NDNAD National Deoxyribonucleic Acid Database

NID National Identity Database

NIMC National Identity Management Commission

NIS Nigerian Immigration Service

CHAPTER 1

INTRODUCTION

1.a Background to Biometrics

Biometrics are more appealing because they are closely bound to an individual and are supposedly more reliable, difficult to forge, lose or falsify.

Following from the above, we have decided to adopt the fingerprint as our main biometric trait for use as the biometric trait in our platform for the central database.

1.b State of National Security in Nigeria

Recent years have been characterized by a more stringent requirement for people to be identifiable in response to security threats and to combat the escalating problems of identity theft. This increasing need to determine who an individual is has resulted in substantial growth in the and use of biometric applications (The Irish Council for Bioethics, 2009).

Many countries, both developed and developing nations, have been victims of security issues. Nigeria is no exception. In recent years, the nation has been in the midst of many security problems stemming from the infamous group Boko Haram; not only that, the country is also dealing with the problem of high crime rates in other aspects, including armed robbery, kidnapping, ritual killings, corruption etc. Many of these crimes remain unsolved due to lack of concrete evidence to pin the actual perpetuator to the crime. This is despite the fact that various Nigerian organizations have biometric information on Nigerian nationals which can be useful in solving some criminal problems as needed; however, the data is scattered across different organizations, lying idle and not being used to their full potential.

According to a publication from the , through the 2015 general elections registration exercise alone, it collected the biometric details of about 68 million Nigerians (The Scoop, 2015), which includes 10 fingerprints images, facial image and bio-data. In addition, various banks at the instance of the CBN, through the BVN exercise have also gathered millions of items of biometric information from Nigerians. According to statistics from the Nigeria Inter-Bank tlement System Plc, NIBSS, show that about 20,833,635 bank customers registered for the BVN (Udo, 2015).

The Nigeria Communications Commission (NCC) requires that every single active mobile telephone number have an individual’s biometric data registered to it. According to NCC statistics, there were more than 145 million active mobile phone lines in Nigeria as at June 2015 (Bolade, 2015).

If all these biometrics are integrated into a whole as a centralized database while excluding redundancy, then they can be put to use in solving some of the security concerns and criminal problems of Nigeria.

1.c Aim and Objectives

The aim of this research work is to develop a framework for nation-wide integration of biometric information.

The following objectives combine to achieve the aim:

1. To develop a platform that can serve as a wrapper for biometric data captured;

2. To develop a centralized database system of biometric information of Nigerian nationals; and

3. To integrate security control of access to system.

1.d Scope and Limitation

The framework developed from this study is meant for unimodal biometric system, as it will only cover fingerprints because of their uniqueness, availability and ease of collection. According to (Edgar, 2006), of all the methods of identification, fingerprinting alone has proved to be both infallible and feasible. Its superiority over the older methods, such as branding, tattooing, distinctive clothing, photography and body measurements (Bertillon system), has been demonstrated time after time. While many cases of mistaken identification have occurred with these older systems, to date the fingerprints of no two individuals have been found to be identical. This model does not provide a framework for policies to regulate its use. I assume that such a system will be regulated and deployed by corresponding government agencies in charge. Theft and social engineering methods of unauthorized access are not considered. The framework shall also consider some of the soft biometric traits, it will include:
Age; Gender; and Ethnicity.

This study does not, however, cater for other numerous biometric such as hand geometry, iris scan, due to its unavailability in other organizations’ databases and unused nature in this part of the world.

1.e Significance of the Study

The significance of this study should be felt in various sectors of the country, including the judicial sectors, military, health care sector and others, but most importantly, it would be significant in the area of national security. The framework could serve as a platform for government and authorities to seek for enhanced security solutions to protect borders, issue secure ID documents, monitor public places and combat terrorism.

Some specific applications include adoption in:

Identification documents and border control; Criminal prevention and prosecution;

Identifying known or suspected criminals; and Control of illegal immigration.

1.f Justification of Study

1.g Definition of Terms

1. Biometrics: a technology that identifies individual uniquely based on their physiology or behavioural traits

2. Biometric template: the individual mathematical data set calculated from a biometric sample

3. Biometric system: an automated system capable of taking a biometric sample, extracting biometric data, comparing it with other biometric data and deciding whether or not the recognition process has been successful

4. Framework: a layered structure indicating what kind of programs can or should be built and how they would interrelate

5. Central database: a database that is located, stored and maintained in a single location. This location is most often a central computer or database system, for example a desktop or server CPU, or a mainframe computer.

1.h Organization of the Study

The study is structured into five chapters. The first chapter gives an introduction to the thesis, comprising the background, the aim and objectives and the significance. The second chapter, which is the literature review, gives an in-depth overview of the concepts that relate to this work, it also presents a review of previous work done by other researchers in this field. The third chapter, research methodology, gives an insight into how the work was implemented, the methods and software adopted. Discussion of results, the fourth chapter, presents the implemented work, giving explanations on how the applications and databases function. Lastly, chapter five gives a brief summary of the entire thesis work and presents a conclusion.

Not What You Were Looking For? Send Us Your Topic

click here to get this project topic material with complete chapters 1-5 for just ₦3000 flat rate.

INSTRUCTIONS AFTER PAYMENT

After making payment, kindly send the following:
  • 1.Your Full name
  • 2. Your Active Email Address
  • 3. Your Phone Number
  • 4. Amount Paid
  • 5. Project Topic
  • 6. Location you made payment from

» Send the above details to our email; contact@premiumresearchers.com or to our support phone number; (+234) 0813 2546 417 . As soon as details are sent and payment is confirmed, your project will be delivered to you within minutes.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Advertisements