1.1 Background of the Study
Personal identification is ever present in our daily lives. For example we often have to prove our identity for getting access to bank accounts, entering a protected site, withdrawing cashing from an ATM machine, logging into a computer, and so on. Conventionally, we identity ourselves and gain access by physically carrying passports, keys, access cards or by remembering passwords, secret codes, and personal identification numbers (PINs). Unfortunately, passport, keys, access cards can be lost, duplicated, stolen, or forgotten; and password, secret codes and personal identification numbers (PINs) can easily be forgotten, compromised, shared or observed. Such deficiencies of conventional personal identification techniques have caused major problems to all concerned. For example, hackers often disrupt computer networks, credit card fraud is estimated at billions dollars per year worldwide. Therefore, robust, reliable and foolproof personal identification solutions must be sought in order to address the deficiencies of the conventional techniques, something that could verify that someone is physically the person he/she claims to be (Hassin, & Hamad, 2018).
A biological verification system is a unique, measureable characteristic or trait of a human being for automatically recognized or verifying identity. Digital identity can be interpreted as the codification of identity names and attributes of physical instance in a way that facilitates processing. In each organization there is normally a role or department for managing the scheme of digital identities of their staff and their own objects. These represented by object identity or object identifiers. Besides bolstering security, the systems also enhance user convenience by alleviating the need to design and remember multiple complex passwords. In this project, a biological system is proposed for human verification i.e. authenticating the identity of an individual. The software uses human features for verification process (Hassin, et al., 2018).
National security has been a source of concern to all and sundry in Nigeria. There is the issue of religious crisis in some states of the Northern part of Nigeria, ritual killings and kidnappings in some states of the South-East and South-South, sectarian clashes in some states of the South-West, bombings in Abuja and some states of the federation. In order to reinforce Security and Justice in Nigeria, and to ensure the security of citizens, it is important to establish at all levels a concrete and user-friendly system which will enable an efficient exchange of information on previous convictions of criminals. Information about previous convictions shall circulate between judges and prosecutors as well as police authorities. This is essential in order to provide adequate responses to crime and also to prevent new crimes from being committed.
What motivated or propelled me to write this project is because of so many reasons; firstly, free access to confidential files by unauthorized person which causes loss of crime report and records stored in files and Due to the existing system for verifying crime suspects, most times innocent citizens are convicted for crime not committed. Having seen the problems in the existing system, Fingerprint verification system will enable the police to have accurate statistics to draw analysis from, on information of a case, the year a crime was committed, who investigated it, etc.” This project is titled “Design and Implementation of fingerprint verification system for crime”. The software uses human features for verification process. Today, Computerization is a major advancement in technology that helped in many field of organization. It makes information storage, manipulation and retrieval easier and faster thus saving time and manpower.
Manual crime records in Nigeria Police, Atani Crime Investigation Department, were maintained on paper, and were created and updated manually (typewriter or hand-written). Manual verification and record keeping has resulted in many setbacks to the expected standard.
The bottleneck encountered includes:
As a result of these problems, the manual system of verification system for crime is very clumsy, partial, inefficient and time consuming.
1.3 Aim and Objectives of the Study
The aim of this study is to design and implement a fingerprint verification system, which will assist the Nigerian Police Force (NPF) in their bid to solve crimes with timely and useful information about criminals and/or their mode of operations so as to nip in the bud criminal activities in a given locality.
The aims and objectives are;
1.4 Significance of the Study
To maximize the benefit of technology to intelligence operations, a large amount of information, a large number of people, collected over a long period of time would be needed. These raise civil liberties issues. The importance of this system is to:
1.5 Scope of the Study
This project is designed to support operation policing by providing crime related information investigation analysis, capabilities for deleting and apprehension offenders. It encompasses the relevant aspects of information management system such as data handling storage of data and cases, updating of information. In view of the scope, fingerprint verification system for crime application will be implemented to help authenticating all suspected crime cases in Nigeria Police force.
1.6 Limitations of Study
Some of the constraints that may have in one-way or another affected the outcome of this work include:
1.7 Definition of Terms
Analyst: This is a person or professional who studies the problem encountered by a system and creates means of solving them by introducing a better system.
Authentication: it is the process of recognizing a user’s identity.
Biometric: it is the measurement and statistical analysis of people’s unique physical and behavioral characteristics.
Code: It is a written guideline that helps to determine whether a specific action is ethical or unethical.
Computer: Computer is an electronic device operating the control of instructions stored in its memory that can accept data (input) manipulate the data according to a specified rules (processing) produces result output and stores the result for future use.
Crime: Crime is an illegal acts or ability that can be punishable by law of the land. It can be immortal act against humanity to extremity. Some examples are fraud, rapes, embezzlement and theft.
Criminal Investigation Department: This is a department of police force whose duty and responsibility is to investigate and solve crime and related offenses.
Data processing: is defined as the entire process of converting or manipulating data into definite meaningful information (Adigwe, & Okoye, 2015).
Data: It is the facts collected for decision making they are facts that are kept to be processed to get more information.
Database Management System (DBMS): it is software which controls the flow of data and checks and checks on how data are stored.
Database: is an organized /unique collection of related files. It is a collection of schemas, tables, queries, reports, views and other object.
Design: is the art or process of designing how something will look, work.
Fingerprint: it is an impression left by the fiction ridges of a human finger.
Information: is a processed data that can be read and understand.
Investigation Police Officer: This a police officer not lower than the rank of an inspector who is assigned either by the police commissioner or the division police officer to lead investigation team and report back to the appropriate authority.
Offence: An act omission which renders that person doing the act or making the omission liable to punishment under the criminal code or under any act or law.
Offense Report Information (ORI): This is a publication that with crime incidents, administrative and criminal report collected over a period of time.
Security: This helps to prevent unauthorized users from illegally accessing certain data within the database, it protects your data/ files.
Software: These are set of logically related instructions given to the computer to perform some specific task.
System: Is the collection of hardware and software, data information procedure and people.
Verification: it is the process of establishing the truth, accuracy, or validity of something.
Vulnerability: a weakness in a target that can potentially be exploited by a threat.
Web Site: It is a location on the web that publishes some kinds of information.