A Framework for Nation-Wide Integration of Biometric Information

ABSTRACT

Having a central database for Nigeria which organizations can rely on for identification/verification purposes, has been a plan in the pipeline for many years now. This has become urgent because of the nation’s current security challenges and the problem of multiple enrolments across various organizations. All of these organizations collect data, but the data collected is not useful outside the collecting organizations.

According to various reports, the Nigerian government has been trying to create a central database to contain Nigerian nationals’ basic and biometric information, to be managed by the Nigerian Identity Management Commission (NIMC), but to no avail. The project ‘National Identity Database’ creation was started in 2007 and has not yet been successful.

This thesis aims to create a central platform for integrating all of these biometric data to curb these problems while considering the security of access control. In this work, we created four web applications and databases to represent information from four organizations; the Nigerian Immigration System, the Independent National Electoral Commission, Bank, and NIMC, with NIMC as the central point. The data represented include their enrollees’ basic and biometric information (fingerprints). The web applications were designed using C#.net on visual studio IDE alongside supporting software like MySQL connector, Adobe Fireworks and database access with PhpMyAdmin. Each application includes four modules, enrolment, admin, query and verification. The verification module serves as the platform where different organizations’ applications can interface with the central database, allowing individuals to be identified from any point.

The overall system developed provides a platform to curb multiple and indiscriminate collections of biometric (fingerprint) data, a major challenge in the country.

Keywords: Biometric, Central database, Fingerprint, Verification and Identification

REFERENCES

Ahuja, M. S., & Chabbra, S. (2011). Biometric encryption: Combining fingerprints and cryptography. Communications in Computer and Information Science, 169 CCIS, 505–514. https://doi.org/10.1007/978-3-642-22577-2_69

Bala, D. (2008). Biometrics and information security. Proceedings of the 5th Annual Conference on Information Security Curriculum Development – InfoSecCD ’08, 64–66. https://doi.org/10.1145/1456625.1456644

Bamigbade, K., & Onifade, O. (2014). Gehe : a Mul Tif Actored Model of Soft and Hard Biometric Trait for Ease of. IEEE.

Bolade, P. (2015). Active Telephone Lines In Nigeria Hit 145.4 Million – NCC. Retrieved January 1, 2001, from http://techcabal.com/2015/06/05/active-telephone-lines-in-nigeria-hit-145-4- million-ncc/

Breedt, M., & Martin, O. (2004). Using A Central Data Repository For Biometric Authentication In Passport Systems. Issa, (2054024), 1–12. Retrieved from http://dblp.uni- trier.de/db/conf/issa/issa2004.html#Breedt04

Charles, W., Patrick, G., & Ramaswamy, C. (2007). SP 800-76-1. Biometric Data Specification for Personal Identity Verification.

Chaurasia, O. P. (2012). An Approach to Fingerprint Image Pre-Processing. International Journal of Image, Graphics and Signal Processing, 4(6), 29–35. https://doi.org/10.5815/ijigsp.2012.06.05

Clement, I. (2017). FG to merge BVN, driver’s licence, National Identity card. Retrieved October 20, 2017, from http://www.tribuneonlineng.com/fg-merge-bvn-drivers-licence-national- identity-card/

Daugman, J. (2000). Biometric decision landscapes. Technical Report-University of Cambridge Computer Laboratory, (482), 13. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.14.3071&rep=rep1&ty pe=pdf

De Luis-García, R., Alberola-López, C., Aghzout, O., & Ruiz-Alzola, J. (2003). Biometric identification systems. Signal Processing, 83(12), 2539–2557. https://doi.org/10.1016/j.sigpro.2003.08.001

Deepika, & Soni, N. (2013). Database Security: Threats and Challenges. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), 810–813. Retrieved from http://www.ijarcsse.com/docs/papers/Volume_3/5_May2013/V3I5-0309.pdf

A Framework for Nation-Wide Integration of Biometric Information

The Framework of Economic...

The Framework of Economic and Human Rights Under the...

The Defence of Mistake...

ABSTRACT The importance of Criminal Law as a vehicle for...

Corporate Capacity and the...

ABSTRACT Any act of a company outside the Memorandum and...

Appraisal of the Impediments...

CHAPTER ONE APPRAISAL OF THE IMPEDIMENTS TO INHERITANCE UNDER ISLAMIC...

Strategic Management in the...

ABSTRACT The article defines the constructive role of strategic management...

The Defence of Provocation...

Abstract The aim of the thesis is to make a...

The Framework of Economic and Human Rights Under the ECOWAS Treaty

The Framework of Economic and Human Rights Under the ECOWAS Treaty: A Case Study of Implementation in Nigeria ABSTRACT The 1975 ECOWAS Treaty made by the...

The Defence of Mistake in Nigerian Law

ABSTRACT The importance of Criminal Law as a vehicle for the advancement of humanity cannot be overemphasized. "This is the law on which men place their...

Corporate Capacity and the Ultra Vires Rule Under Nigerian Law

ABSTRACT Any act of a company outside the Memorandum and Articles of Association of the company or the statute(s) creating the company is Ultra Vires....

Appraisal of the Impediments to Inheritance Under Islamic Law

CHAPTER ONE APPRAISAL OF THE IMPEDIMENTS TO INHERITANCE UNDER ISLAMIC LAW 1.1 GENERAL BACKGROUND Some obstacles and impediments prevent an inheritor from benefiting from the assets left...

Strategic Management in the Formation of the Company Personnel

ABSTRACT The article defines the constructive role of strategic management in forming and developing company personnel. The original model of work with company staff is...

The Defence of Provocation in Nigeria and Sudan – A Comparative Study

Abstract The aim of the thesis is to make a comparative study of the defence of provocation in Nigeria and Sudan. Provocation as a defence...

Appellate Jurisdiction of Nigerian Courts in Civil Matters

Abstract The majority of appellants and some appellate courts are ignorant or oblivious to the proper rules of appeal, resulting in a lot of injustices...

Assessment of Petroleum Profit Tax Under the Nigerian Tax Laws

CHAPTER ONE 1.0 GENERAL INTRODUCTION 1.1 Introduction Petroleum Profit Tax Act provides that: Assessment of tax shall be made in such form and in such manner as the...

A Study of Customary Land Law and Tenure Practices of Six Communities of the Lower Benue River Valley of Nigeria

ABSTRACT This study is aimed at studying the customary land laws and tenurial practices of the communities of the Nigerian Lower Benue River valley. These...