CHAPTER ONE
INTRODUCTION
1.1 Background of the Study
Personal identification is ever present in our daily lives. For example we often have to prove our identity for getting access to bank accounts, entering a protected site, withdrawing cashing from an ATM machine, logging into a computer, and so on. Conventionally, we identity ourselves and gain access by physically carrying passports, keys, access cards or by remembering passwords, secret codes, and personal identification numbers (PINs). Unfortunately, passport, keys, access cards can be lost, duplicated, stolen, or forgotten; and password, secret codes and personal identification numbers (PINs) can easily be forgotten, compromised, shared or observed. Such deficiencies of conventional personal identification techniques have caused major problems to all concerned. For example, hackers often disrupt computer networks, credit card fraud is estimated at billions dollars per year worldwide. Therefore, robust, reliable and foolproof personal identification solutions must be sought in order to address the deficiencies of the conventional techniques, something that could verify that someone is physically the person he/she claims to be (Hassin, & Hamad, 2018).
A biological verification system is a unique, measureable characteristic or trait of a human being for automatically recognized or verifying identity. Digital identity can be interpreted as the codification of identity names and attributes of physical instance in a way that facilitates processing. In each organization there is normally a role or department for managing the scheme of digital identities of their staff and their own objects. These represented by object identity or object identifiers. Besides bolstering security, the systems also enhance user convenience by alleviating the need to design and remember multiple complex passwords. In this project, a biological system is proposed for human verification i.e. authenticating the identity of an individual. The software uses human features for verification process (Hassin, et al., 2018).
National security has been a source of concern to all and sundry in Nigeria. There is the issue of religious crisis in some states of the Northern part of Nigeria, ritual killings and kidnappings in some states of the South-East and South-South, sectarian clashes in some states of the South-West, bombings in Abuja and some states of the federation. In order to reinforce Security and Justice in Nigeria, and to ensure the security of citizens, it is important to establish at all levels a concrete and user-friendly system which will enable an efficient exchange of information on previous convictions of criminals. Information about previous convictions shall circulate between judges and prosecutors as well as police authorities. This is essential in order to provide adequate responses to crime and also to prevent new crimes from being committed.
What motivated or propelled me to write this project is because of so many reasons; firstly, free access to confidential files by unauthorized person which causes loss of crime report and records stored in files and Due to the existing system for verifying crime suspects, most times innocent citizens are convicted for crime not committed. Having seen the problems in the existing system, Fingerprint verification system will enable the police to have accurate statistics to draw analysis from, on information of a case, the year a crime was committed, who investigated it, etc.” This project is titled “Design and Implementation of fingerprint verification system for crime”. The software uses human features for verification process. Today, Computerization is a major advancement in technology that helped in many field of organization. It makes information storage, manipulation and retrieval easier and faster thus saving time and manpower.
- Statement of the Problems
Manual crime records in Nigeria Police, Atani Crime Investigation Department, were maintained on paper, and were created and updated manually (typewriter or hand-written). Manual verification and record keeping has resulted in many setbacks to the expected standard.
The bottleneck encountered includes:
- Accessing of confidential data files by unauthorized persons.
- The process of finding the accused and justifying case within the Nigerian security agency has been tedious, most times innocent citizens are convicted for crime not committed because of lack of prove. Or being wrongly accused.
- Criminal case are been investigated blindly or based on assumption, by facial look and appearance. Example. A situations were citizens will be arrested and torture to confess on being guilty of a crime.
- Accuracy about cases being treated by this security agencies are not guaranteed a bit, because there might be a case of the accused being identical or forms of resemblance.
- Time wastage: Delay in provision of vital information for decision making.
- Partial or total loss of file or documents.
As a result of these problems, the manual system of verification system for crime is very clumsy, partial, inefficient and time consuming.
1.3 Aim and Objectives of the Study
The aim of this study is to design and implement a fingerprint verification system, which will assist the Nigerian Police Force (NPF) in their bid to solve crimes with timely and useful information about criminals and/or their mode of operations so as to nip in the bud criminal activities in a given locality.
The aims and objectives are;
- To develop software that will enable fingerprint verification mode, receive and store crime reports.
- To integrate a system that will help in anticrime fight, with the aim of bringing justices to the desk.
- To develop a verification system where prime suspects on crimes can be verified using their fingerprint.
- To integrate a system that will capture the finger metrics of all Nigerian citizens to a single database, and making it available for use and accessible for the course of this research.
- To improve the verification system of our security agencies and procedure, thereby, bringing accuracy to their investigation in crime committed.
- To ensure data security by restricting unauthorized access to the program and to the crime database.
1.4 Significance of the Study
To maximize the benefit of technology to intelligence operations, a large amount of information, a large number of people, collected over a long period of time would be needed. These raise civil liberties issues. The importance of this system is to:
- Access information by only authorized user.
- Maintainability: the proposed software meeting changing needs of verifying crime record.
- Dependability: the proposed software is trustworthy.
- Efficiency: the software does not waste time and human resource.
- Usability: the software is usable by the users (staff) for which it was designed.
1.5 Scope of the Study
This project is designed to support operation policing by providing crime related information investigation analysis, capabilities for deleting and apprehension offenders. It encompasses the relevant aspects of information management system such as data handling storage of data and cases, updating of information. In view of the scope, fingerprint verification system for crime application will be implemented to help authenticating all suspected crime cases in Nigeria Police force.
1.6 Limitations of Study
Some of the constraints that may have in one-way or another affected the outcome of this work include:
- Lack of adequate fund to finance the project: this was one of the limitation to this work because much money is needed to carry out a detailed research work which is not easily borne by every student.
- The limited knowledge of ASP.net and Visual Basic programming was great challenge to this project. However, more research was made to complete this project successfully.
1.7 Definition of Terms
Analyst: This is a person or professional who studies the problem encountered by a system and creates means of solving them by introducing a better system.
Authentication: it is the process of recognizing a user’s identity.
Biometric: it is the measurement and statistical analysis of people’s unique physical and behavioral characteristics.
Code: It is a written guideline that helps to determine whether a specific action is ethical or unethical.
Computer: Computer is an electronic device operating the control of instructions stored in its memory that can accept data (input) manipulate the data according to a specified rules (processing) produces result output and stores the result for future use.
Crime: Crime is an illegal acts or ability that can be punishable by law of the land. It can be immortal act against humanity to extremity. Some examples are fraud, rapes, embezzlement and theft.
Criminal Investigation Department: This is a department of police force whose duty and responsibility is to investigate and solve crime and related offenses.
Data processing: is defined as the entire process of converting or manipulating data into definite meaningful information (Adigwe, & Okoye, 2015).
Data: It is the facts collected for decision making they are facts that are kept to be processed to get more information.
Database Management System (DBMS): it is software which controls the flow of data and checks and checks on how data are stored.
Database: is an organized /unique collection of related files. It is a collection of schemas, tables, queries, reports, views and other object.
Design: is the art or process of designing how something will look, work.
Fingerprint: it is an impression left by the fiction ridges of a human finger.
Information: is a processed data that can be read and understand.
Investigation Police Officer: This a police officer not lower than the rank of an inspector who is assigned either by the police commissioner or the division police officer to lead investigation team and report back to the appropriate authority.
Offence: An act omission which renders that person doing the act or making the omission liable to punishment under the criminal code or under any act or law.
Offense Report Information (ORI): This is a publication that with crime incidents, administrative and criminal report collected over a period of time.
Security: This helps to prevent unauthorized users from illegally accessing certain data within the database, it protects your data/ files.
Software: These are set of logically related instructions given to the computer to perform some specific task.
System: Is the collection of hardware and software, data information procedure and people.
Verification: it is the process of establishing the truth, accuracy, or validity of something.
Vulnerability: a weakness in a target that can potentially be exploited by a threat.
Web Site: It is a location on the web that publishes some kinds of information.
DISCLAIMER: All project works, files and documents posted on this website, eProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. eProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. The paid subscription on eProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.